Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Utility executives worldwide are concerned that cyberattacks could disrupt their electric distribution grids in the next five years [Read More]
Siemens releases patches for high severity access control vulnerability that can be exploited to launch remote attacks on its industrial switches [Read More]
Kaspersky detected 18,000 malware samples belonging to 2,500 families on industrial automation systems in the first half of 2017 [Read More]
While critical infrastructure has been targeted by sophisticated threat actors, attacks involving commonly available tools, such as DDoS, are more likely, says Europol [Read More]
Siemens and PAS announce strategic partnership to provide cybersecurity solutions for industrial control systems (ICS) [Read More]
Mocana this week announced that it has verified the integration of its IoT Security Platform with the IoT cloud platforms of Amazon Web Services, Microsoft Azure IoT, and VMware. [Read More]
US Energy Department announces $50 million investment in tools and technology to improve resilience and security of energy infrastructure. Over $20 million allocated for cybersecurity [Read More]
Smiths Medical Medfusion 4000 wireless syringe infusion pumps affected by serious flaws. Patches coming only next year [Read More]
Firms in the energy and utilities sector increasingly targeted and most attacks involved command injections [Read More]
Russia-linked hackers apparently targeting control systems in energy facilities in the United States and Europe [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
Organizations need specialized monitoring and control technologies for ICS networks that provide the deep, real-time visibility to identify suspicious or malicious activity
Barak Perelman's picture
If WannaCry had targeted industrial controllers, it would have been much more difficult to protect them and the damage would have been much more widespread.
Riaz Zolfonoon's picture
It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk.
David Holmes's picture
An organization with a mature security process should be doing threat modeling on web applications and Internet of Things devices in the enterprise.
Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.
David Holmes's picture
Don’t dismiss the IoT as just a consumer security problem. We have an opportunity to learn from the mistakes of the original Internet and build some security into the Internet of Things, if we act quickly.
Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Barak Perelman's picture
Industrial organizations need early detection of suspicious activity like unauthorized network scans, attempts to read information from controllers and other unsanctioned control-plane activity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.