Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Siemens’ Patch Tuesday updates for April 2019 address several serious vulnerabilities, including some DoS flaws affecting many of its industrial products. [Read More]
The tools and TTPs used by the threat group behind the Triton/Trisis malware show that the hackers are focused on maintaining access to compromised systems. [Read More]
A survey conducted by Ponemon and Tenable reveals that 90% of organizations that have OT infrastructure experienced at least one damaging cyberattack in the past two years. [Read More]
Updates released by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several DoS vulnerabilities introduced by the use of Cisco software. [Read More]
TXOne Networks, the IIoT security-focused joint venture between Trend Micro and Moxa, unveiled its first product, an industrial intrusion prevention system (IPS). [Read More]
A study conducted by Trend Micro shows that the manufacturing industry is exposed to a wide range of threats, in many cases due to long equipment life cycles. [Read More]
Critical and high severity code execution and DoS vulnerabilities have been found and patched in Advantech’s WebAccess SCADA software. [Read More]
SecurityWeek’s 2019 Singapore ICS Cyber Security Conference, the largest and longest-running cybersecurity event series for industrial sectors, will take place on April 16-18 at the Fairmont Singapore & Swissôtel The Stamford. [Read More]
Rockwell Automation’s Allen Bradley PowerFlex 525 AC drives are affected by a critical DoS vulnerability that allows hackers to gain control of devices. [Read More]
Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.