Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Norwegian metals and energy giant Norsk Hydro has been hit by a serious ransomware attack that impacted operations, forcing the company to resort to manual processes. [Read More]
One of the world's biggest aluminium producers, Norway's Norsk Hydro, has been hit by an "extensive cyberattack" that impacted operations. [Read More]
Industrial cybersecurity firm Dragos on Monday announced the acquisition of ICS visibility tech provider NexDefense and the release of free security assessment tools. [Read More]
Venezuelan President Nicolas Maduro's government says the massive power outage was caused by a cyberattack launched by the United States, but experts say a breakdown of old equipment is much more likely. [Read More]
Over a dozen vulnerabilities, including ones classified as critical, have been found by researchers in industrial switches from Moxa. Patches and mitigations have been released by the vendor. [Read More]
The Venezuelan government claims a massive power outage that has hit the country was caused by a cyberattack and a cyberattack also prevented authorities from restoring power. [Read More]
The products of several industrial automation companies are affected by the recently disclosed vulnerabilities in the WibuKey DRM solution. [Read More]
A critical vulnerability in Rockwell Automation’s RSLinx Classic software can be exploited for DoS attacks and possibly for remote code execution. [Read More]
Tripwire launches Penetration Testing Assessment and Industrial Cybersecurity Assessment services to help organizations find vulnerabilities in their systems. [Read More]
Siemens informs customers that its SICAM process control system and SIMATIC WinCC HMI are affected by serious vulnerabilities in the WibuKey DRM. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.