Security Experts:

long dotted


Siemens patches 21 more vulnerabilities related to processing specially crafted files in its product development solutions. [Read More]
A hacker’s attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation’s water systems may be to attacks by more sophisticated intruders. [Read More]
An unknown hacker accessed the city’s water control systems in Oldsmar, Florida and increased sodium hydroxide to dangerous levels. [Read More]
Industrial cybersecurity firm OTORIO releases an open source tool designed to help organizations secure GE CIMPLICITY HMI/SCADA systems. [Read More]
The number of ICS vulnerabilities disclosed in 2020 increased by 25% compared to 2019 and 30% compared to 2018, Claroty reports. [Read More]
Siemens has released patches for its SIMATIC HMI panels to address a high-severity vulnerability that can be exploited remotely to take full control of a device. [Read More]
Mission Secure, a provider of visibility and cybersecurity solutions for industrial environments, has raised $5.6 million through a Series B financing round. [Read More]
CISA has issued an advisory to warn industrial organizations about some Fuji Electric HMI products being affected by several high-severity remote code execution vulnerabilities. [Read More]
Hundreds of industrial organizations, many in the manufacturing sector, apparently received the Sunburst malware as part of the SolarWinds hack. [Read More]
American packaging giant WestRock has disclosed a ransomware incident that impacted both IT and OT systems. [Read More]


rss icon

Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.