Top Stories

New data from GHD Digital revealed critical infrastructure under siege amidst rising cyber threats, vulnerabilities
New data from GHD Digital revealed critical infrastructure under siege amidst rising cyber threats, vulnerabilities
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency
HHS’ ARPA-H launches UPGRADE program to enhance hospital cyber resilience
HHS’ ARPA-H launches UPGRADE program to enhance hospital cyber resilience
Claroty’s Team82 exposes critical vulnerabilities in Honeywell’s ControlEdge UOC's EpicMo protocol
Claroty’s Team82 exposes critical vulnerabilities in Honeywell’s ControlEdge UOC’s EpicMo protocol
Preparing your OT Environment for NIS2 Compliance
Preparing your OT Environment for NIS2 Compliance
EPA alerts drinking water systems on cybersecurity vulnerabilities, increasing enforcement actions
EPA alerts drinking water systems on cybersecurity vulnerabilities, increasing enforcement actions
Critical Infrastructure Protection in Modern Society

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.

Industry Experts

Jonathon Gordon
Critical Infrastructure Protection in Modern Society
Welcome to Critical Infrastructure Protection Across modern society, critical infrastructure serves as the backbone supporting the essential services... Read full story
Sinclair Koelemij
Through the Lens of a Case Study: What It Takes to Be a Cyber-Physical Risk Analyst
I regularly cover the topic of cyber-physical risk analysis in my writings, and as a result, I’ve received... Read full story
Sarah Fluchs
What the Cyber Resilience Act requires from manufacturers
Documentation, documentation, documentation (that’s actually better than it sounds) What is the Cyber Resilience Act? The Cyber Resilience... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Ilan Barda
Preparing your OT Environment for NIS2 Compliance
The NIS2 directive is about five months away from becoming law in the European Union (EU). While some... Read full story
Rodrigo Mendes Augusto
Comprehensive Guide to Integrated Operations (Part 4)
Network and OT Cyber Security Requirements: ICT for Integrated Operations In Integrated Operations, where Information and Communication Technology... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story

Features

Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Global alarm intensifies as state-sponsored cyberattacks raise risks to critical infrastructure, national security
Global alarm intensifies as state-sponsored cyberattacks raise risks to critical infrastructure, national security
Growing threat of malware and ransomware attacks continues to put industrial environments at risk
Growing threat of malware and ransomware attacks continues to put industrial environments at risk
Securing cloud, IIoT in Industry 4.0 emerges crucial for protecting industrial operations across OT/ICS environments
Securing cloud, IIoT in Industry 4.0 emerges crucial for protecting industrial operations across OT/ICS environments
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions
Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments
Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security

News

Regulation, Standards and Compliance
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency
HHS’ ARPA-H launches UPGRADE program to enhance hospital cyber resilience
Preparing your OT Environment for NIS2 Compliance
TSA seeks feedback on enhanced transportation security assessments for surface transportation personnel