Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Industrial organizations have been informed about the existence of several potentially serious vulnerabilities affecting a Matrikon (Honeywell) OPC UA product. [Read More]
DNSpooq is the name given to 7 Dnsmasq vulnerabilities that could expose millions of devices to DNS cache poisoning, remote code execution and DoS attacks. [Read More]
Some of Siemens’ product development solutions are affected by tens of vulnerabilities that can be exploited for arbitrary code execution using malicious files. [Read More]
Several vulnerabilities have been found in Pepperl+Fuchs Comtrol industrial gateways, including flaws that can be exploited to gain root access to a device and create backdoors. [Read More]
Researchers have found vulnerabilities that expose Rockwell Automation’s FactoryTalk Linx and RSLinx Classic products to DoS attacks. [Read More]
Industrial cybersecurity firm Dragos has hired Steve Applegate, former VP and Deputy CISO at PepsiCo, as Chief Information Security Officer (CISO). [Read More]
Several critical vulnerabilities found in Kepware industrial automation products can be exploited to crash servers, obtain information and execute arbitrary code. [Read More]
The Treck TCP/IP stack is affected by two newly disclosed critical vulnerabilities leading to code execution and denial of service. [Read More]
German Chancellor Angela Merkel's Cabinet approved a bill that would require companies involved in setting up critical infrastructure such as high-speed 5G networks to guarantee that their equipment can't be used for sabotage, espionage or terrorism. [Read More]
A vast majority of OT devices affected by the Urgent/11 vulnerabilities and many devices affected by an actively exploited CDPwn flaw remain unpatched. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.