Security Experts:

long dotted


Join SecurityWeek and Microsoft for at live webinar to learn about live zero trust enablement through monitoring and automation of IoT/OT environments. [Read More]
Microsoft launched new managed services styled as a combination of technologies, threat intelligence and skilled personnel to help businesses hunt for signs of compromise or outsource the handling of detection and response incidents. [Read More]
One year after the cyberattack, the US Department of Transportation has proposed a fine of nearly $1 million to Colonial Pipeline over control room management failures. [Read More]
OT security solutions provider Network Perception raises $13 million in Series A funding. [Read More]
Turkey-based industrial and financial conglomerate Sabanci Group has signed an agreement to acquire a majority stake in OT cybersecurity company Radiflow for $45 million. [Read More]
Researchers discovered that the brake controllers found on many tractor-trailers in North America are susceptible to remote hacker attacks. [Read More]
Several critical and high-severity vulnerabilities have been found to affect SmartPTT and SmartICS industrial products. [Read More]
Pwn2Own Miami 2022, a hacking contest focusing on industrial control systems (ICS), has come to an end, with contestants earning a total of $400,000 for their exploits. [Read More]
Despite an increase in attacks, ICS/OT companies admit that they turn off cybersecurity systems if they cause problems to operations. [Read More]
Experts believe the new Incontroller (Pipedream) malware designed to target ICS and SCADA systems may have been developed by Russia to target energy facilities. [Read More]


rss icon

Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Galina Antova's picture
The biggest advantage defenders have as the nature of the conflict and strategies evolve, is to know their networks better than the adversary.
Galina Antova's picture
We must encourage the growth of research communities to help strengthen industrial cybersecurity, and we need to act fast.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.