With the gas shortages stemming from the ransomware attack on the Colonial Pipeline Co. still fresh in our minds, coupled with the fact that most cybersecurity efforts tend to focus on IT assets like ...
In March 2016, Iranian hackers conducted a cyberattack against a critical infrastructure target located in New York, successfully taking control of a government computer system. The target wasn’t a ...
Update (July 17th): The authors of the Industroyer research, Anton Cherepanov and Robert Lipovsky, will present their findings at Black Hat USA in Las Vegas on July 26th, 2017. More information can be ...
At the end of February, PICMG (PCI Industrial Computer Manufacturers Group)—the consortium for open hardware specifications—introduced InterEdge, a modular architecture for process control systems ...
Applying essential machine safety protocols along with the use of certified control devices and risk mitigation strategies ...
Company is first industrial control systems provider to receive ISASecure ISA/IEC 62443 cybersecurity certifications across distributed control system, components, secure development lifecycle, and ...
Time and again, industry reports provide discouraging evidence that our defenders are unable to detect and prevent intrusions from advanced, directed and highly structured cyber threats in a timely ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. Industrial control systems are often some ...
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report. The systems that power the manufacturing, power and water plants, the ...
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? A recent incident where a likely nation-state threat ...
As cyber attacks on infrastructure providers increase, adversaries who specifically target industrial control systems (ICS) have emerged, according to researchers at Cybereason. This was one of the ...