Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
CISA has been named a Top-Level Root CVE Numbering Authority and it will oversee CNAs that issue CVE identifiers for vulnerabilities in industrial and medical products. [Read More]
OT and IoT cybersecurity company Nozomi Networks announced this week that it’s now a CVE Numbering Authority (CNA). [Read More]
Several major ICS vendors have released security advisories in response to the recently disclosed vulnerabilities affecting the CodeMeter licensing and DRM solution. [Read More]
Vulnerabilities in the CodeMeter licensing and DRM solution from Wibu can expose industrial systems to remote attacks. [Read More]
Over 70% of the ICS vulnerabilities disclosed in the first half of 2020 were remotely exploitable, Claroty reports. [Read More]
Industrial cybersecurity firm Radiflow launches CIARA, an automated risk analysis platform for industrial systems. [Read More]
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference has been extended to August 31st. [Read More]
The first entirely virtual edition of the Black Hat cybersecurity conference took place last week and researchers from tens of organizations presented the results of their work from the past year. [Read More]
Vulnerabilities found in protocol gateway devices can allow hackers targeting industrial systems to launch stealthy attacks. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.