January 23, 2018
Security researchers found 14 vulnerabilities in Gemalto Sentinel hardware tokens, which could allow dangerous ICS attacks, including full-system takeover.
September 07, 2017
Security researchers claim to be tracking a threat group called Dragonfly 2.0 hacker group that has been attacking critical infrastructure and setting up persistent infections on ICS networks.
July 27, 2017
Security researchers at Black Hat 2017 analyzed the Industroyer malware, the attack on Ukraine's power grid and what it means for industrial control system security in the U.S.
June 13, 2017
Researchers discovered new details of a Kiev ICS attack from December using CrashOverride malware that could be used to disrupt an insecure electrical grid.
ICS Get Started
Bring yourself up to speed with our introductory content
ANSI/ISA-95, more commonly referred to as ISA-95, is an international standard for enterprise and control systems integration developed for manufacturers. Continue Reading
An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments. Continue Reading
A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task. Continue Reading
Evaluate ICS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Pervasive sensing is a relatively new concept, but its security risks are well-developed. Expert Ernie Hayden explains this new trend and its associated security implications. Continue Reading
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision. Continue Reading
Learn to apply best practices and optimize your operations.
Trisis malware targets safety instrumented systems and puts industrial control systems at risk. Expert Ernie Hayden reviews what to know about SIS and its security measures. Continue Reading
Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden explains the differences. Continue Reading
In this excerpt from chapter 3 of Industrial Network Security, authors Eric D. Knapp and Joel Langill discuss the history and trends of industrial cybersecurity. Continue Reading
Problem Solve ICS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CrashOverride malware targets industrial control systems and can wreak havoc. Expert Judith Myerson explains the capabilities of the malware and what to do to stop it. Continue Reading
WannaCry malware has been plaguing organizations across the world. Expert Ernie Hayden explains how this ransomware threatens ICS networks and their security. Continue Reading
Certain Siemens SCADA products were found to be vulnerable to local privilege escalation. Expert Nick Lewis explains how the SCADA vulnerability works and how to protect your systems. Continue Reading