Security Experts:

long dotted


Poland agreed to test a cybersecurity pilot program for the aviation sector as Europe's EASA civil aviation authority tackles the potential threats posed by hackers to air traffic. [Read More]
A partnership between Tenable and Siemens aims to provide improved visibility into vulnerabilities within OT environments. [Read More]
Advantech patches arbitrary code execution vulnerabilities in its WebAccess HMI/SCADA product [Read More]
A Russia-linked threat group has been targeting people associated with Turkish critical infrastructure through compromised Turkish sites, according to threat management firm RiskIQ. [Read More]
Some industrial networking devices are also vulnerable to KRACK Wi-Fi attacks, including from Cisco, Rockwell and Sierra Wireless [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
DHS and FBI warn of attacks by Russia-linked actor on government entities and organizations in the energy, nuclear, water, aviation, and critical manufacturing sectors [Read More]
U.S. Federal Energy Regulatory Commission (FERC) proposes new cyber security management controls to enhance power grid reliability and resilience [Read More]
Siemens patches two vulnerabilities, including one rated high severity, in building automation controllers [Read More]
Siemens releases firmware update for 7KT smart meters to address a critical authentication bypass vulnerability [Read More]


rss icon

Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Jalal Bouhdada's picture
Everyone from bedroom hackers to state sponsored spies have wanted to breach critical systems since the dawn of the networked era, whether that be for monetary gain, secret information, or just pure curiosity.
Ashley Arbuckle's picture
The goal of IT/OT convergence is to make the OT side more resilient through effective cyber protections, and instill confidence in your board and senior executives.
Barak Perelman's picture
The successful deployment of industrial cybersecurity projects must leverage resources from both IT and OT.
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.