Security Experts:

long dotted


Russia-linked hackers apparently targeting control systems in energy facilities in the United States and Europe [Read More]
Westermo patches high severity vulnerabilities found by Qualys in the company’s MRD industrial wireless routers [Read More]
Siemens releases patches for vulnerabilities affecting automation and power distribution products [Read More]
Vulnerabilities in Cisco’s IOS software expose industrial switches from Rockwell Automation to remote attacks [Read More]
A report from The National Infrastructure Advisory Council (NIAC) warns there is a narrow and fleeting window to prepare for and prevent "a 9/11-level cyber-attack" against the U.S. critical infrastructure. [Read More]
Automated Logic patches several vulnerabilities, including one high severity flaw, in its WebCTRL building automation product [Read More]
IOActive researchers show how a remote attacker can hack an industrial collaborative robot, or cobot [Read More]
Elon Musk and over 100 robotics and AI entrepreneurs demand global ban on killer robots [Read More]
Philips and ICS-CERT warn healthcare providers of potentially serious vulnerabilities in a radiation exposure tool [Read More]
Dragos has raised $10 million through a Series A round of funding led by investors Energy Impact Partners (EIP) and Allegis Capital. [Read More]


rss icon

Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.
Barak Perelman's picture
Organizations need specialized monitoring and control technologies for ICS networks that provide the deep, real-time visibility to identify suspicious or malicious activity
Barak Perelman's picture
If WannaCry had targeted industrial controllers, it would have been much more difficult to protect them and the damage would have been much more widespread.
Riaz Zolfonoon's picture
It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk.
David Holmes's picture
An organization with a mature security process should be doing threat modeling on web applications and Internet of Things devices in the enterprise.
Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.