Security Experts:

long dotted


Experts and vendors warn that industrial control systems (ICS) are also at risk of getting hit by WannaCry ransomware attacks [Read More]
Industry experts comment on the implications of U.S. President Donald Trump’s executive order on cybersecurity [Read More]
Rockwell Automation updates firmware on Stratix 5900 routers to patch over 60 vulnerabilities discovered since 2014 in Cisco’s IOS software [Read More]
Siemens has started patching several DoS vulnerabilities in SIMATIC, SCALANCE and other industrial products [Read More]
Around 120,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products are vulnerable to a newly discovered Internet of Things (IoT) botnet called Persirai. [Read More]
According to a recent survey, only 1.5% of executives at large companies say they have a "clear vision with implementation well underway" for industrial internet of things (IIoT). [Read More]
Researchers tested the security of industrial robots and discovered that many machines can be hacked remotely [Read More]
Researchers discovered several vulnerabilities in Evoko meeting room management devices [Read More]
Cloudflare's new Orbit service allows IoT device manufacturers to instantly deploy “virtual patches” and block vulnerabilities across devices on the network simultaneously. [Read More]
A critical vulnerability in GE protection relays poses a serious threat to the power grid, researchers claim [Read More]


rss icon

Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.
David Holmes's picture
Don’t dismiss the IoT as just a consumer security problem. We have an opportunity to learn from the mistakes of the original Internet and build some security into the Internet of Things, if we act quickly.
Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Barak Perelman's picture
Industrial organizations need early detection of suspicious activity like unauthorized network scans, attempts to read information from controllers and other unsanctioned control-plane activity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.