June 13, 2017
Researchers discovered new details of a Kiev ICS attack from December using CrashOverride malware that could be used to disrupt an insecure electrical grid.
April 28, 2017
The 2017 Verizon DBIR details threats becoming more popular, like ransomware, and some that are less known, but dangerous, like pretexting.
ICS Get Started
Bring yourself up to speed with our introductory content
A programmable logic controller (PLC) is a modular solid state computer with custom programming. The systems are used in the industrial control systems (ICS) for machinery in a wide range of industries, including many of those involved in critical infrastructure. Continue Reading
A human-machine interface (HMI) is the user interface that connects an operator to the controller for an industrial system. Continue Reading
An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments. Continue Reading
Evaluate ICS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Pervasive sensing is a relatively new concept, but its security risks are well-developed. Expert Ernie Hayden explains this new trend and its associated security implications. Continue Reading
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision. Continue Reading
Learn to apply best practices and optimize your operations.
In this excerpt from chapter 3 of Industrial Network Security, authors Eric D. Knapp and Joel Langill discuss the history and trends of industrial cybersecurity. Continue Reading
For critical infrastructure, a combination of situational awareness and compliance could be the best approach to industrial control system security. Continue Reading
As standards and security models emerge, security professionals can take steps today to improve Internet of Things security. Continue Reading
Problem Solve ICS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Certain Siemens SCADA products were found to be vulnerable to local privilege escalation. Expert Nick Lewis explains how the vulnerability works and how to protect your systems. Continue Reading
For manufacturers, IoT technology brings new cyber-risks. Here's what you should know about keeping your systems safe from hackers. Continue Reading
When you connect manufacturing machinery to the internet, you've created a potential gateway for hackers. Here's a look at the risks you might be facing. Continue Reading