• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • The importance of consumer trust in the second-hand mobile market
  • 2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up

ICS/SCADA

Get our Top Stories to your inbox
industry

A new taxonomy for SCADA attacks

  • January 15, 2019
  • attack
  • cyber risk
  • cybersecurity

Attacks aimed at SCADA networks are still much rarer than those targeting IT networks, but the number is slowly rising. And, according to Radiflow CTO Yehonatan Kfir, …

industrial

Strategies for expertly protecting industrial control systems

  • January 14, 2019
  • book
  • CISO
  • cybersecurity

Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …

industry

Best practice methodology for industrial network security: SEC-OT

  • December 3, 2018
  • Andrew Ginter
  • critical infrastructure
  • cybersecurity

Secure Operations Technology (SEC-OT) is a methodology and collection of best practices inspired by a decade of experience working with secure industrial sites. The SEC-OT …

industry

IIoT technologies integration creates expansion opportunities in the industrial cybersecurity industry

  • December 3, 2018
  • critical infrastructure
  • cybersecurity
  • Frost & Sullivan

High penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure and the manufacturing sector has resulted in a growing number of potential …

money

Closing the security gap will drive $125 billion critical infrastructure security spending

  • November 12, 2018
  • ABI Research
  • cybersecurity
  • ICS/SCADA

Critical infrastructures are radically transforming on an unprecedented scale, boosted by a rapid adoption of ‘smart’ operational technologies. Cybersecurity is a growing part …

industrial

USB threat vector trends and implications for industrial operators

  • November 2, 2018
  • hardware
  • Honeywell
  • ICS/SCADA

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

industry

Many water and energy systems vulnerable to significant cyber risk

  • October 31, 2018
  • cyber risk
  • cybersecurity
  • ICS/SCADA

New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …

industry

Safeguarding global critical networks now and in the future

  • October 30, 2018
  • CISO
  • cybersecurity
  • ICS/SCADA

Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions …

industry

The risk to OT networks is real, and it’s dangerous for business leaders to ignore

  • October 24, 2018
  • CISO
  • cybersecurity
  • CyberX

Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …

industry

GreyEnergy group targeting critical infrastructure with espionage

  • October 17, 2018
  • APT
  • cybercrime
  • ESET

ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in …

Posts navigation

1 2 3 4 5 6 … 16 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

mobile device

The importance of consumer trust in the second-hand mobile market

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

Don't miss

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX