Join SecurityWeek and Microsoft for at live webinar to learn about live zero trust enablement through monitoring and automation of IoT/OT environments. [Read More]
Microsoft launched new managed services styled as a combination of technologies, threat intelligence and skilled personnel to help businesses hunt for signs of compromise or outsource the handling of detection and response incidents. [Read More]
One year after the cyberattack, the US Department of Transportation has proposed a fine of nearly $1 million to Colonial Pipeline over control room management failures. [Read More]
Turkey-based industrial and financial conglomerate Sabanci Group has signed an agreement to acquire a majority stake in OT cybersecurity company Radiflow for $45 million. [Read More]
Researchers discovered that the brake controllers found on many tractor-trailers in North America are susceptible to remote hacker attacks. [Read More]
Pwn2Own Miami 2022, a hacking contest focusing on industrial control systems (ICS), has come to an end, with contestants earning a total of $400,000 for their exploits. [Read More]
Experts believe the new Incontroller (Pipedream) malware designed to target ICS and SCADA systems may have been developed by Russia to target energy facilities. [Read More]
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation: