Top Stories

Building a Culture of Cyber Resilience in Manufacturing (WEF)
WEF playbook addresses cyber resilience in manufacturing and supply chains, provides three guiding principles
DOE, EPA support NSM-22 focused on critical infrastructure security and resilience
DOE, EPA support NSM-22 focused on critical infrastructure security and resilience
White House releases National Security Memorandum on critical infrastructure security and resilience
White House releases National Security Memorandum on critical infrastructure security and resilience
US DHS delivers safety and security guidelines to secure critical infrastructure from AI-related threats
US DHS delivers safety and security guidelines to secure critical infrastructure from AI-related threats
US DHS establishes AI Safety and Security Board to advise on safe deployment in critical infrastructure
US DHS establishes AI Safety and Security Board to advise on safe deployment in critical infrastructure
AI for Energy - Opportunities for a Modern Grid and Clean Energy Economy (DoE)
US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.

Industry Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Sinclair Koelemij
Through the Lens of a Case Study: What It Takes to Be a Cyber-Physical Risk Analyst
I regularly cover the topic of cyber-physical risk analysis in my writings, and as a result, I’ve received... Read full story
Sarah Fluchs
What the Cyber Resilience Act requires from manufacturers
Documentation, documentation, documentation (that’s actually better than it sounds) What is the Cyber Resilience Act? The Cyber Resilience... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Rodrigo Mendes Augusto
Comprehensive Guide to Integrated Operations (Part 4)
Network and OT Cyber Security Requirements: ICT for Integrated Operations In Integrated Operations, where Information and Communication Technology... Read full story
Ilan Barda
Sprinting Toward NIS2 Compliance
OT networks are under increasing attack. Water distribution, oil extraction, maritime, transportation, manufacturing, pharmacy, health services, and other... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story

Features

Securing cloud, IIoT in Industry 4.0 emerges crucial for protecting industrial operations across OT/ICS environments
Securing cloud, IIoT in Industry 4.0 emerges crucial for protecting industrial operations across OT/ICS environments
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions
Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments
Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
Growing need to address cybersecurity challenges across US healthcare sector for improved resilience
Growing need to address cybersecurity challenges across US healthcare sector for improved resilience
Dealing with OT asset monitoring and discovery to enhance cybersecurity across industrial, OT systems
Dealing with OT asset monitoring and discovery to enhance cybersecurity across industrial, OT systems
Empowering women in ICS cybersecurity, promoting diversity and inclusion remains in focus as S4x24 takes off
Empowering women in ICS cybersecurity, promoting diversity and inclusion remains in focus as S4x24 takes off
Exploring changing terrain of OT/ICS cybersecurity issues, regulatory adherence, new threats
Exploring changing terrain of OT/ICS cybersecurity issues, regulatory adherence, new threats

News

Vendors
Xage’s Zero Trust Session Collaboration tool delivers remote access, collaboration across industrial frameworks
Xage announces AI-powered analytics and insight capabilities to boost zero trust access and protection
TXOne Networks presents SageOne, its new CPS protection platform
Critical Start introduces managed detection and response services for OT environments
Shift5 debuts GPS integrity module to combat GPS spoofing risks
Management & Strategy
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Emerging Trends and Securing the Future of Smart Manufacturing
Cybersecurity Strategies and Best Practices for Manufacturing
New US CISA Recommendations on Security by Design