Researchers identified 20 critical vulnerabilities in a type of Advantech industrial-grade wireless access points that is widely deployed across critical infrastructure environments. Attackers could exploit the flaws to remotely executive code and create denials of service.
Cybersecurity once conjured images of IT departments, server rooms and corporate firewalls. Today, it extends far beyond these traditional domains, becoming essential in fields like manufacturing, agriculture, healthcare, transportation, robotics and space exploration.
French multinational Schneider Electric disclosed critical vulnerabilities in its Modicon M340, Momentum and MC80 programmable automation controllers. The vulnerabilities could allow unauthorized access, data manipulation and system interruptions.
The acquisition of D'Crypt strengthens ST Engineering's cryptographic and high-security engineering capabilities while addressing evolving OT cybersecurity challenges in critical infrastructure sectors, said Goh Eng Choon, president of cyber at ST Engineering.
The modern CISO’s role is expanding as cloud adoption accelerates and cybersecurity demands grow more complex. While safeguarding data and managing incident response are still crucial, today’s CISOs must also prioritize cloud security, automation, and compliance to remain effective. Download the playbook which...
Nearly 31% of organizations reported six or more cyber intrusions in the past year, highlighting the escalating risks OT systems face. This comprehensive whitepaper explores the latest trends in attack types, techniques, and OT security maturity, providing essential insights for leaders aiming to strengthen defenses...
As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
Dennis Giese, a security researcher and engineer, built his first computer at around age 8 using spare parts. Years later, he hacked his first robotic vacuum cleaner. Giese reflects on his journey as a researcher and ethical hacker during HardPwn, a hardware hackathon hosted by Hardwear.io in Amsterdam.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
ISMG's Cybersecurity Pulse Report: ManuSec USA 2024 Edition is an essential resource for senior cybersecurity leaders and marketers navigating the complex landscape of operational technology security in manufacturing. This exclusive report distills critical insights from 61 industry pioneers.
Ken Soh, group CIO at BH Global, and John Lee, managing director at GRF, discuss how the rise of smaller renewable energy producers and smart grid initiatives is forcing a rethink of traditional cybersecurity frameworks.
The maritime industry faces several challenges from cyberattacks, pushing it to quickly adapt to an evolving threat landscape while complying with new regulatory requirements. Ken Soh, CEO of Athena Dynamics, outlines key strategies to protect offshore operations from escalating cyber risks.
Healthcare has become the number one target for cyberattacks, with organizations spending an average of $11 million per ransomware incident, says Jojo Nufable, vice president at St. Luke's Medical Center. He shares why traditional security approaches fall short as AI-powered devices proliferate.
The growing convergence of operational technology with business networks creates new attack vectors requiring CISO attention. Smart building components and industrial systems now pose risks to critical business functions, said Steven Sim, chair, executive committee at OT-ISAC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.