Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
Featured Articles
Image of Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
    • Threats & Vulnerabilities

Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Tyler Wall
  • May 26, 2022
Read More
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security
  • A rise in ransomware leaves businesses looking for answers
  • Check out Vulnerability Pulse for the latest news on hacks and security breaches

EXPERT VIDEO SERIES
Richard Robinson, CEO of Cynalytica Inc.
    • IT/OT

Using Machine Learning to Protect OT: Expert Interview Series, Richard Robinson, Cynalytica

Jim Cook, COO of Velta Technology
  • Strategies

Understanding Cybersecurity Insurance: Expert Interview Series, Jim Cook, Velta Technology

Richard Robinson, CEO of Cynalytica Inc.
  • IT/OT

Protecting Legacy OT Systems: Expert Interview Series, Richard Robinson, Cynalytica

Matt Leipnik, lead industrial cybersecurity specialist for Nexus Controls.
  • Strategies

Building a Culture of Cybersecurity: Expert Interview Series, Matt Leipnik, Nexus Controls

THREATS AND VULNERABILITIES
Courtesy: Brett Sayles

Throwback Attack: DDoS attacks are born in the Big Ten

Share
Courtesy: CFE Media and Technology

A rise in ransomware leaves businesses looking for answers

Share

Throwback Attack: Careto malware attacks more than 30 countries

Share
Courtesy: CFE Media

The Colonial Pipeline cyberattack exposed the soft underbelly of U.S. critical infrastructure

Share
STRATEGIES

Will CISA recommend securing industrial control systems?

Share
Courtesy: Brett Sayles

How to implement layered industrial cybersecurity in volatile times

Share
Courtesy: CFE Media and Technology

Improve two-factor authentication system security

Share
Courtesy: CFE Media and Technology

Shields up for industrial control systems

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) – May 19, 2022
  • Mitsubishi Electric – May 19, 2022
  • Apache – May 16, 2022
  • CISA – May 16, 2022
  • Joint Cybersecurity Advisory – May 17, 2022
RECENT NEWS
  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security
IIoT & CLOUD
Courtesy of CFE Media and Technology

Three risks to consider before taking your business’s accounting to the cloud

  • Mike Whitmire
Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

  • Matt Shipman
Image of IT/OT convergence on a control panel

New concepts to reduce the risk of ransomware in IIoT environments

  • John Livingston

How industrial control systems can be secure in the cloud

  • David Masson
EDUCATION

Protecting Critical Infrastructure eBook

Share
Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

Share

Webcast: How to Protect Against Supply Chain Attacks

Share
Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

Share
NETWORKS
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
  • Networks

IDS developed for industrial control systems

  • Southwest Research Institute
  • May 3, 2022
Southwest Research Institute has developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.…
Share
Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
  • Networks

Six critical components of integrated cybersecurity for industrial control systems (ICS)

  • Anil Gosine
  • January 18, 2022
Learning Objectives Examine six ways to approach industrial cybersecurity. Look at internal and external industrial cybersecurity threats, without silos. Learn that legacy process sensors lack…
Share
Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
  • Networks

Securing the ICS: Measure solution effectiveness, maturity

  • Robert Henderson
  • December 27, 2021
Many articles focused on cybersecurity stress how important it is to secure an industrial control system (ICS) and share ways to implement this security. In this article, the assumption is…
Share
IT/OT
Courtesy of: Verve Industrial

Four benefits of OT endpoint security asset management

Share
Courtesy: CFE Media

Adapting XDR for OT cybersecurity

Share

How Conti ransomware took down operational technology

Share
As threat increases, college cybersecurity programs are more in demand

Dragos YIR report shows rise in threat groups, vulnerabilities and ransomware

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
HACKS & ATTACKS
  • Throwback Attack: Ethical hackers take down a Google office building

  • Back door to a building.

    Throwback Attack: Russian APT group Turla has hit 45 countries since 2004

  • Throwback attack: The Equation Group, ‘God of cyberespionage’

  • Courtesy: Brett Sayles

    Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

FACILITIES
Courtesy: A3/Siemens

Industrial robot utilization requires cybersecurity strategy

  • Emmet Cole

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

  • Christina Miller
Courtesy: CFE Media and Technology

Lack of qualified cybersecurity personnel for critical infrastructure

  • John Livingston
Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect

Cybersecurity-centered systems and fundamentals

  • Damon Purvis
REGULATIONS
Courtesy: CFE Media

What to know about the Bureau of Cyberspace and Digital Policy

Share
New Freedom Waste Water Plant treatment plant, New Freedom, PA, is an example of how water districts recently replaced a legacy control system and now are using industrial Ethernet protocols to enable more cybersecurity resilience thanks to the Infrastructure Improvement and Jobs Act.

The 2021 Infrastructure Improvement and Jobs Act targets plant upgrades to enable resilient cybersecurity

Share
Image contains wires plugged into a digital device.Image courtesy: Brett Sayles

CMMC 2.0 retains focus on maturity, streamlines governance and reduces cost of compliance

Share
Courtesy: Brett Sayles

ISASecure Certification benefits

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
ONLINE EDUCATION
    • Education

    Protecting Critical Infrastructure eBook

    • Education

    Webcast: How to Protect Against Supply Chain Attacks

    • Education

    Webcast: Bridging the Cybersecurity Gap, 5 Things IT and OT Can Learn From Each Other

HELPFUL LINKS
  • NIST Cybersecurity Framework
  • National Cyber Security Alliance
  • ISA Cybersecurity Resources
  • SANS institute

Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT