Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Cisco Talos researchers identified over a dozen vulnerabilities in Moxa industrial wireless access points (APs) as part of a two-week analysis of the product [Read More]
Hundreds of thousands of IIoT and ICS products could be exposed to attacks due to critical vulnerabilities affecting a widely used CODESYS framework [Read More]
Modbus-related Implementation flaws allow attackers to execute arbitrary commands on controllers from several vendors [Read More]
Researchers disclose unpatched vulnerabilities in Schneider Electric PLCs. Vendor admits dropping the ball in communicating with the experts [Read More]
Honeywell has launched a new product designed to protect industrial facilities from USB-borne threats [Read More]
Schneider Electric patches several vulnerabilities in Modicon PLCs and Wonderware InTouch HMI products [Read More]
Siemens shares recommendations for mitigating several vulnerabilities affecting some of its RUGGEDCOM appliances [Read More]
Targeted attacks aimed at companies in the industrial sector are increasingly common, Kaspersky warns [Read More]
Mocana's IoT Security Platform is a comprehensive full-stack security solution designed to protect industrial IoT devices, industrial clouds and device-to-cloud communications. [Read More]
Cisco patches critical remote code execution vulnerability found by the company in its industrial routers [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Barak Perelman's picture
Industrial organizations need early detection of suspicious activity like unauthorized network scans, attempts to read information from controllers and other unsanctioned control-plane activity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.