Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

The NSA and CISA have urged critical infrastructure operators in the United States to take measures to reduce the cyber exposure of industrial assets. [Read More]
The failure of organizations in Israel’s water sector to secure cellular routers made it possible for hackers to launch a second round of attacks on the country’s water facilities. [Read More]
Industrial solutions veteran Yaniv Vardi has been appointed the CEO of industrial cybersecurity company Claroty. [Read More]
A total of 7 ransomware families have been found to target industrial applications, including CLOP, which targets at least 150 OT processes. [Read More]
Industrial cybersecurity firm Claroty has announced the availability of AccessDB Parser, an open source tool that allows researchers to analyze Microsoft Access database files associated with SCADA applications. [Read More]
Researchers have discovered several potentially serious vulnerabilities in monitoring, cooling and power distribution products made by Germany-based Rittal. [Read More]
Honeywell has seen a significant increase in USB-borne malware that can cause major disruption to industrial control systems (ICS). [Read More]
There are more than 3,000 BIG-IP installations vulnerable to attacks exploiting CVE-2020-5902 and hackers have been using the flaw to deliver DDoS malware. [Read More]
Recent fires and explosions at Iranian facilities, including the Natanz nuclear site targeted by the notorious Stuxnet malware, may have been caused deliberately as part of an operation that involved cyberattacks. [Read More]
ICS-targeting Snake/EKANS ransomware manipulates the firewall to isolate infected systems before initiating the file encryption process. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.