Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Precise agriculture is exposed to vulnerabilities and cyber-threats, a new report from the United States Department of Homeland Security (DHS) warns. [Read More]
Splunk unveils Splunk for Industrial IoT, a solution designed to help organizations secure ICS, monitor and diagnose equipment, and predict downtime [Read More]
US Energy Department is offering up to $28 million for tools and technologies designed to improve the resilience and cybersecurity of energy critical infrastructure [Read More]
Critical vulnerabilities affecting Fuji Electric servo systems and drives have been disclosed, but patches are not available [Read More]
Industrial cybersecurity firm Nozomi Networks raises $30 million in a Series C funding round, which brings the total secured by the company to date to nearly $54 million [Read More]
Remote administration tools (RATs) used for legitimate purposes in operational technology networks can pose a serious risk, allowing malicious actors to target industrial systems, Kaspersky warns [Read More]
Rockwell Automation patches several critical and high severity vulnerabilities that allow DoS attacks and possibly code execution in RSLinx Classic communications software [Read More]
Google’s Android team finds high severity privilege escalation vulnerability in Honeywell’s Android-based handheld computers [Read More]
Forcepoint has announced a new business unit focusing on securing industrial control systems (ICS) and critical infrastructure. [Read More]
Several serious arbitrary code execution flaws found in Fuji Electric V-Server, a tool that links the HMIs on the plant floor with PCs on the corporate network [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.