industrial control systems
SynSaber Report Brings More Context to ICS Security
An analysis of three years of vulnerabilities found in industrial control systems (ICS) published by SynSaber, a provider of an ICS monitoring platform, found that while there may be no patches available, ...
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol
What if you could no longer trust the critical process values displayed on your HMI screen? Executive Summary When operating […] ...
The Importance of ICS Cybersecurity
For the past 25 years, I have been working with Operational Technology (OT), and for the last 10 I have […] ...
Russia ‘Plans’ HUGE Cyberattack on Critical Infrastructure
The Ukrainian government has warned that Russia is planning a massive attack against the critical infrastructure of Ukraine and of its allies ...
Considerations for merging your IT and OT environments into ICS
Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ...
What Is the Role of Incident Response in ICS Security?
In recent years, cyber espionage has been growing in magnitude and complexity. One of the most common targets is Industrial Control Systems (ICS) within critical infrastructure sectors. With many organizations relying more ...
Contextualizing the Ransomware Threat Confronting OT Environments
Back in early June, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) published a fact sheet discussing the rising threat of ransomware to operational technology (OT) assets. This development raises several questions ...
The Future of Industrial Cybersecurity
In the next five years, cybersecurity for industrial control systems (ICS) is expected to achieve strong growth, with estimates predicting the sector will be worth approximately $22.8 billion by 2026. With help ...
Malicious Life Podcast: The Tesla Hack
It's every company's nightmare: a mysterious stranger approached an employee of Tesla's Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job - insert a malware-laden USB ...
How Pipeline Owners and Operators Can Fulfill the TSA’s Second Security Directive
Back in June, I wrote about the Transportation Security Agency’s (TSA) new security directive concerning pipeline owners and operators. The order mandated those entities to disclose security incidents such as the ransomware ...