Please turn on your JavaScript for this page to function normally.
money
Closing the security gap will drive $125 billion critical infrastructure security spending

Critical infrastructures are radically transforming on an unprecedented scale, boosted by a rapid adoption of ‘smart’ operational technologies. Cybersecurity is a growing part …

industrial
USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

industry
Many water and energy systems vulnerable to significant cyber risk

New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …

industry
Safeguarding global critical networks now and in the future

Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions …

industry
The risk to OT networks is real, and it’s dangerous for business leaders to ignore

Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …

industry
GreyEnergy group targeting critical infrastructure with espionage

ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in …

industry
The future of OT security in modern industrial operations

Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. In this podcast, Andrew Ginter, VP of Industrial …

malware
Researchers link Industroyer to NotPetya

ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts …

industrial
Safe IT/OT integration with unidirectional security gateways

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …

Vulnerabilities and architectural considerations in industrial control systems

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …

industry
Malicious hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most …

Advantech WebAccess
Advantech WebAccess RCE flaw still exploitable, exploit code available

A vulnerability in Advantech WebAccess, a web browser-based software package for human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) systems, …

Don't miss

Cybersecurity news