Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
Featured Articles
Image of Protecting the power grid through cyber-physical threat response
    • Threats & Vulnerabilities

Protecting the power grid through cyber-physical threat response

  • Kala McCain
  • June 24, 2022
Read More
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure
  • Supply Chain Attacks eBook
  • Check out Vulnerability Pulse for the latest news on hacks and security breaches

EXPERT VIDEO SERIES
Richard Robinson, CEO of Cynalytica Inc.
    • IT/OT

Using Machine Learning to Protect OT: Expert Interview Series, Richard Robinson, Cynalytica

Jim Cook, COO of Velta Technology
  • Strategies

Understanding Cybersecurity Insurance: Expert Interview Series, Jim Cook, Velta Technology

Richard Robinson, CEO of Cynalytica Inc.
  • IT/OT

Protecting Legacy OT Systems: Expert Interview Series, Richard Robinson, Cynalytica

Matt Leipnik, lead industrial cybersecurity specialist for Nexus Controls.
  • Strategies

Building a Culture of Cybersecurity: Expert Interview Series, Matt Leipnik, Nexus Controls

THREATS AND VULNERABILITIES
Supply Chain Attacks eBook

Supply Chain Attacks eBook

Share
Courtesy: CFE Media

Throwback attack: Contractor plants Siemens logic bomb to keep income flowing

Share
Courtesy: CFE Media

IST’s Ransomware Task Force seeks to remedy ransomware attacks

Share
A hacker in the background.

Throwback Attack: MiniDuke malware attacks 23 countries

Share
STRATEGIES

The value of penetration testing ICS/OT environments

Share
A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Share

New approach allows for faster ransomware detection

Share

Will CISA recommend securing industrial control systems?

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric – June 14, 2022
  • Meridian Cooperative – June 14, 2022
  • Johnson Controls – June 14, 2022
  • Microsoft – June 14, 2022
  • Citrix – June 14, 2022
RECENT NEWS
  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure
IIoT & CLOUD
Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

  • David Nosibor
Courtesy: Brett Sayles

Webcast: Addressing Cybersecurity Challenges in Industry 4.0

  • CFE Media and Technology
Courtesy: CFE Media

Increasing smart factory cybersecurity using a trusted execution environment

  • Lauren Thompson
Courtesy of CFE Media and Technology

Three risks to consider before taking your business’s accounting to the cloud

  • Mike Whitmire
EDUCATION
Graphic of M1 Chip

Researchers discover a new hardware vulnerability in the Apple M1 chip

Share

Webcast: Using MITRE ATT&CK for ICS to Protect Your Business

Share

Protecting Critical Infrastructure eBook

Share
Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

Share
NETWORKS
Courtesy: Brett Sayles
  • Networks

Managing external connections to your operational technology (OT) environment

  • Miriam Lorbert
  • June 21, 2022
Dragos recently published the Dragos 2021 Year In Review report, which highlighted four key findings within the operational technology (OT) cyber threat landscape. This blog continues the…
Share
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
  • Networks

IDS developed for industrial control systems

  • Southwest Research Institute
  • May 3, 2022
Southwest Research Institute has developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.…
Share
Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
  • Networks

Six critical components of integrated cybersecurity for industrial control systems (ICS)

  • Anil Gosine
  • January 18, 2022
Learning Objectives Examine six ways to approach industrial cybersecurity. Look at internal and external industrial cybersecurity threats, without silos. Learn that legacy process sensors lack…
Share
IT/OT
Courtesy of: Verve Industrial

Four benefits of OT endpoint security asset management

Share
Courtesy: CFE Media

Adapting XDR for OT cybersecurity

Share

How Conti ransomware took down operational technology

Share
As threat increases, college cybersecurity programs are more in demand

Dragos YIR report shows rise in threat groups, vulnerabilities and ransomware

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
HACKS & ATTACKS
  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Courtesy: Brett Sayles

    Throwback Attack: DDoS attacks are born in the Big Ten

  • Courtesy: CFE Media

    A rise in ransomware leaves businesses looking for answers

  • Throwback Attack: Careto malware attacks more than 30 countries

FACILITIES

How a desert water utility helped protect critical infrastructure

  • Gary Cohen
A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO

Industrial robot utilization requires cybersecurity strategy

  • Emmet Cole
Courtesy: Brett Sayles

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

  • Christina Miller

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

  • Christina Miller
REGULATIONS
Courtesy: CFE Media

What to know about the Bureau of Cyberspace and Digital Policy

Share
New Freedom Waste Water Plant treatment plant, New Freedom, PA, is an example of how water districts recently replaced a legacy control system and now are using industrial Ethernet protocols to enable more cybersecurity resilience thanks to the Infrastructure Improvement and Jobs Act.

The 2021 Infrastructure Improvement and Jobs Act targets plant upgrades to enable resilient cybersecurity

Share
Image contains wires plugged into a digital device.Image courtesy: Brett Sayles

CMMC 2.0 retains focus on maturity, streamlines governance and reduces cost of compliance

Share
Courtesy: Brett Sayles

ISASecure Certification benefits

Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
ONLINE EDUCATION
  • Courtesy: Brett Sayles
    • IIoT & Cloud

    Webcast: Addressing Cybersecurity Challenges in Industry 4.0

  • Supply Chain Attacks eBook
    • Threats & Vulnerabilities

    Supply Chain Attacks eBook

    • Education

    Webcast: Using MITRE ATT&CK for ICS to Protect Your Business

HELPFUL LINKS
  • NIST Cybersecurity Framework
  • National Cyber Security Alliance
  • ISA Cybersecurity Resources
  • SANS institute

Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT