Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Researchers find vulnerabilities in the PcVue SCADA/HMI solution, including flaws that can allow attackers to take control of industrial processes or cause disruption. [Read More]
PAS Global has agreed to be acquired by Hexagon AB , a provider of sensor, software, and autonomous solutions based in Sweden. [Read More]
A survey of over 600 people conducted by (CS)2AI revealed that while most ICS security incidents are caused by negligent insiders, over 12% of incidents have been attributed to nation-state actors. [Read More]
Hackers could remotely open garage doors and gates by exploiting vulnerabilities found in a gateway device made by Hörmann. [Read More]
A Cisco Talos researcher has found several remotely exploitable DoS vulnerabilities in Allen-Bradley 1794-AENT Flex I/O adapters. [Read More]
Researchers discovered several potentially serious vulnerabilities in Pepperl+Fuchs’s RocketLinx industrial switches, including ones that can be exploited to take complete control of devices. [Read More]
Industrial automation giant Rockwell Automation on Friday announced the acquisition of Oylo, a Spain-based company that provides industrial and IoT security solutions. [Read More]
FireEye's Mandiant Threat Intelligence and MITRE have collaborated on developing a new visualization able to combine the Enterprise ATT&CK and ICS ATT&CK threat knowledgebases into a single view combining both IT and OT attack behaviors. [Read More]
The COVID-19 pandemic has apparently resulted in a rise in ICS being targeted via brute-force attacks on RDP passwords, Kaspersky reported. [Read More]
Microsoft announced on Tuesday at its Ignite conference that it has extended its threat protection portfolio and it has unified some of its security solutions under the Microsoft Defender brand. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.