Security Experts:

ICS/OT
long dotted

NEWS & INDUSTRY UPDATES

Schneider Electric has released patches for its EcoStruxure platform and Modicon PLCs to address a critical vulnerability that was disclosed more than a year ago. [Read More]
GuidePoint Security launches industrial control systems (ICS) security service offerings, including security program review and penetration testing. [Read More]
Hacktivists might not know a lot about ICS, but they’re well aware of the potential implications of hacking these devices, and some groups have been targeting ICS to draw attention to their cause. [Read More]
CISA and NSA have described the typical game plan of malicious actors targeting critical infrastructure control systems. [Read More]
Critical vulnerabilities in Dataprobe’s iBoot-PDU power distribution unit can allow hackers to remotely shut down connected devices. [Read More]
Operant Networks has emerged from stealth mode with $3.8 million in seed funding and a Secure Access Service Edge (SASE) solution for energy operational technology (OT). [Read More]
A Kingspan water tank management system used by organizations worldwide is affected by a critical vulnerability and the vendor does not appear to be willing to patch it. [Read More]
LTE and 5G network security firm OneLayer recieved a $6.5 million equity investment from Koch Disruptive Technologies (KDT), the VC arm of Koch Industries. [Read More]
Vulnerabilities found in Flexlan wireless LAN devices used for airplane Wi-Fi can be exploited by a passenger to hack other passengers. [Read More]
ICS Patch Tuesday: Siemens and Schneider Electric have patched dozens of vulnerabilities affecting their products. [Read More]

FEATURES, INSIGHTS // ICS/OT

rss icon

Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture