Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

The Treck TCP/IP stack is affected by two newly disclosed critical vulnerabilities leading to code execution and denial of service. [Read More]
German Chancellor Angela Merkel's Cabinet approved a bill that would require companies involved in setting up critical infrastructure such as high-speed 5G networks to guarantee that their equipment can't be used for sabotage, espionage or terrorism. [Read More]
A vast majority of OT devices affected by the Urgent/11 vulnerabilities and many devices affected by an actively exploited CDPwn flaw remain unpatched. [Read More]
A serious vulnerability affecting CompactRIO controllers made by National Instruments can be exploited to remotely disrupt production in an organization. [Read More]
Siemens and Schneider Electric have addressed several critical and high-severity vulnerabilities in their industrial automation products. [Read More]
Industrial cybersecurity firm Dragos has raised $110 million in a Series C funding round, which brings the total raised by the company to-date to $158 million. [Read More]
Iranian hackers have accessed an unprotected industrial control system (ICS) at a water facility in Israel. [Read More]
Vulnerabilities discovered by researchers in Rockwell Automation’s FactoryTalk Linx product can allow attackers to compromise engineering workstations and tamper with PLCs. [Read More]
A major power outage that occurred in October in Mumbai, India’s largest city, may have been caused by hackers. [Read More]
Schneider Electric has warned its customers about Drovorub, a Russia-linked Linux malware that was recently detailed by the NSA and FBI. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.