Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn! [Read More]
CRASHOVERRIDE/Industroyer, the fourth known ICS malware, was used in the Ukraine energy attacks and it’s designed to specifically target electric grids [Read More]
Honeywell announced that it will establish a new industrial cyber security center of excellence (COE) for Asia Pacific in Singapore. [Read More]
Many industrial firms admitted experiencing at least one security incident in the past 12 months, and large companies said such incidents cost them $500,000 per year [Read More]
Several flaws, including ones rated critical, found in Rockwell Automation’s Allen-Bradley MicroLogix PLCs. Patches available only for some devices [Read More]
It takes SCADA vendors 150 days to patch vulnerabilities, and the industry is roughly at the same level as the cybersecurity sector [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
Schneider Electric patches vulnerabilities, including ones rated high severity, in VAMPSET and SoMachine HVAC products [Read More]
Industry professionals react to WannaCry ransomware attacks, including ICS, insurance, legal, cybersecurity strategy and attribution aspects of the story [Read More]
Experts and vendors warn that industrial control systems (ICS) are also at risk of getting hit by WannaCry ransomware attacks [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
If WannaCry had targeted industrial controllers, it would have been much more difficult to protect them and the damage would have been much more widespread.
Riaz Zolfonoon's picture
It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk.
David Holmes's picture
An organization with a mature security process should be doing threat modeling on web applications and Internet of Things devices in the enterprise.
Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.
David Holmes's picture
Don’t dismiss the IoT as just a consumer security problem. We have an opportunity to learn from the mistakes of the original Internet and build some security into the Internet of Things, if we act quickly.
Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Barak Perelman's picture
Industrial organizations need early detection of suspicious activity like unauthorized network scans, attempts to read information from controllers and other unsanctioned control-plane activity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.