Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

OSIsoft patches multiple vulnerabilities in its PI Web API and PI Server products, including improper authentication and CSRF issues [Read More]
What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn! [Read More]
CRASHOVERRIDE/Industroyer, the fourth known ICS malware, was used in the Ukraine energy attacks and it’s designed to specifically target electric grids [Read More]
Honeywell announced that it will establish a new industrial cyber security center of excellence (COE) for Asia Pacific in Singapore. [Read More]
Many industrial firms admitted experiencing at least one security incident in the past 12 months, and large companies said such incidents cost them $500,000 per year [Read More]
Several flaws, including ones rated critical, found in Rockwell Automation’s Allen-Bradley MicroLogix PLCs. Patches available only for some devices [Read More]
It takes SCADA vendors 150 days to patch vulnerabilities, and the industry is roughly at the same level as the cybersecurity sector [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
Schneider Electric patches vulnerabilities, including ones rated high severity, in VAMPSET and SoMachine HVAC products [Read More]
Industry professionals react to WannaCry ransomware attacks, including ICS, insurance, legal, cybersecurity strategy and attribution aspects of the story [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.
Barak Perelman's picture
The single biggest roadblock to ICS security today is the lack the visibility and control into activity that is occurring at the control layer, namely access and changes made to industrial control devices.
Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
Tim Layton's picture
Based on existing intelligence, it is reasonable to assume that nation-states already possess all the information they need to launch such an attack on the U.S. power grid.