Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

ICS-CERT informed organizations that Siemens and Schneider Electric patched high severity vulnerabilities in their products [Read More]
Siemens patches XSS and CSRF vulnerabilities in RUGGEDCOM network management system (NMS) [Read More]
Robots affected by vulnerabilities that can be exploited for spying, sensitive data theft, and even to cause physical harm or damage [Read More]
The U.S. oil and gas industry is not prepared to address OT cybersecurity risks, according to a Siemens study [Read More]
Researchers warn about the threat posed by logic bombs to industrial control systems (ICS), particularly programmable logic controllers (PLCs) [Read More]
Former sysadmin sentenced to 34 months in prison for hacking into systems of industrial facility and disrupting its operations [Read More]
Study conducted by Trend Micro shows the exposure of critical sectors and industrial systems in the United States [Read More]
Researchers showed the impact of ransomware on ICS by simulating an attack on a water treatment plant [Read More]
Rockwell Automation is teaming up with industrial cybersecurity startup Claroty to combine their security products and services into future, packaged security offerings. [Read More]
ENISA has published a study on the "Communication network dependencies for ICS-SCADA Systems" to provide protection recommendations for ICS-SCADA systems against cyber threats. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.
Barak Perelman's picture
The single biggest roadblock to ICS security today is the lack the visibility and control into activity that is occurring at the control layer, namely access and changes made to industrial control devices.
Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.