Security Experts:

long dotted


Industrial cybersecurity firm Nozomi Networks has raised $15 million in a Series B funding round, the company announced Wednesday. [Read More]
Advantech has patched another round of vulnerabilities, including several rated high severity, in its WebAccess HMI/SCADA product [Read More]
An increasing number of companies in the industrial sector reported experiencing a targeted attack, according to a Kaspersky survey of nearly 1,000 organizations [Read More]
Schneider Electric patches three vulnerabilities, including one rated high severity, in its Pelco VideoXpert Enterprise video management system [Read More]
Some of the rugged tablets, phones and PDAs made by Pepperl+Fuchs-owned ecom are vulnerable to KRACK attacks [Read More]
DHS warns of malware used to target industrial safety systems. Threat known as Triton and Trisis, but DHS calls it HatMan [Read More]
Researchers believe Iran used the Triton/Trisis ICS malware to attack a critical infrastructure organization in Saudi Arabia [Read More]
A new piece of malware designed to target ICS, named "Triton", has been used in an attack on a critical infrastructure organization and the goal may have been to cause physical damage [Read More]
Upstream Security, a Herzliya, Israel-based cybersecurity company that helps protect connected cars and autonomous vehicles, today announced that it has raised $9 million in a Series A funding round. [Read More]
NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]


rss icon

Barak Perelman's picture
2018 will present new and increasing industrial cyber security challenges for facilities operators, but new developments will help minimize those threats.
Galina Antova's picture
There is no more important mission in cybersecurity than securing the Industrial Control Systems networks that power our world and our lives.
Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Jalal Bouhdada's picture
Everyone from bedroom hackers to state sponsored spies have wanted to breach critical systems since the dawn of the networked era, whether that be for monetary gain, secret information, or just pure curiosity.
Ashley Arbuckle's picture
The goal of IT/OT convergence is to make the OT side more resilient through effective cyber protections, and instill confidence in your board and senior executives.
Barak Perelman's picture
The successful deployment of industrial cybersecurity projects must leverage resources from both IT and OT.
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.