Security Experts:

ICS/OT
long dotted

NEWS & INDUSTRY UPDATES

Researchers show that CNC machines contain vulnerabilities that can be exploited to damage or disrupt devices, hijack them, and steal valuable intellectual property. [Read More]
The TSA has issued new cybersecurity requirements for freight and passenger rail operators. [Read More]
The value of the industrial cybersecurity market is expected to significantly increase in the next decade, with some predicting that it will exceed $40 billion by 2030. [Read More]
BAE Systems unveils Viper Memory Loader Verifier II (MLV II), a system whose role is to protect F-16 fighter aircraft against cyberattacks. [Read More]
ICS Patch Tuesday: Siemens and Schneider Electric have released 19 security advisories covering 36 vulnerabilities. [Read More]
Malicious actors could obtain global private keys that protect Siemens PLCs, and the industrial giant has warned that the likelihood of exploitation is increasing. [Read More]
A researcher has discovered seven high-severity remote code execution vulnerabilities in Horner Automation’s Cscape PLC software and they can all be exploited using malicious font files. [Read More]
SCADA systems were involved in many of the breaches suffered by ports and terminals in the United States, according to Jones Walker’s 2022 Ports and Terminals Cybersecurity Survey. [Read More]
SecurityWeek will host its 2022 Industrial Control Systems (ICS) Cybersecurity Conference from October 24 – 27, 2022 at the InterContinental Atlanta Buckhead. [Read More]
Nearly a dozen vulnerabilities, including critical flaws, have been found in a car parking management system made by Italian company Carlo Gavazzi. [Read More]

FEATURES, INSIGHTS // ICS/OT

rss icon

Galina Antova's picture
We must encourage the growth of research communities to help strengthen industrial cybersecurity, and we need to act fast.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.