Top Stories

Vulnerability handling according to the European Cyber Resilience Act (CRA)
Vulnerability handling according to the European Cyber Resilience Act (CRA)
CISA’s JCDC initiative launches 2023 Pipelines Cyber Defense Planning Effort to safeguard ONG sector
CISA’s JCDC initiative launches 2023 Pipelines Cyber Defense Planning Effort to safeguard ONG sector
CISA proposes cyber incident reporting rules under CIRCIA to strengthen US cybersecurity
CISA proposes cyber incident reporting rules under CIRCIA to strengthen US cybersecurity
EclecticIQ details Operation FlightNight targeting Indian government entities, energy sector
EclecticIQ details Operation FlightNight targeting Indian government entities, energy sector
CS4CA USA Summit 2024 panel explores holistic approach to risk management, risk reduction strategies
CS4CA USA Summit 2024 panel explores holistic approach to risk management, risk reduction strategies
Two new MITRE programs central to strengthening cyber defense work on building global cyber capacity
MITRE launches AI Assurance and Discovery Lab to identify, mitigate risks in AI-enabled systems
Emerging Trends and Securing the Future of Smart Manufacturing
Emerging Trends and Securing the Future of Smart Manufacturing

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.

Industry Experts

Jonathon Gordon
First Impressions and Lasting Insights from an S4 Rookie
I must confess, somewhat sheepishly, that this year marked my inaugural visit to S4. Despite previous intentions to... Read full story
Sinclair Koelemij
Vulnerability handling according to the European Cyber Resilience Act (CRA)
So far, cybersecurity regulations in Europe have been primarily driven by the NIS2 regulations. The NIS2 regulations are... Read full story
Sarah Fluchs
What the Cyber Resilience Act requires from manufacturers
Documentation, documentation, documentation (that’s actually better than it sounds) What is the Cyber Resilience Act? The Cyber Resilience... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Rodrigo Mendes Augusto
Comprehensive Guide to Integrated Operations (Part 4)
Network and OT Cyber Security Requirements: ICT for Integrated Operations In Integrated Operations, where Information and Communication Technology... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tony Turner
Threat Modeling for Critical Infrastructure
Threat modeling is a critical component of a Secure by Design strategy. It’s where we identify the product... Read full story

Features

Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
Growing need to address cybersecurity challenges across US healthcare sector for improved resilience
Growing need to address cybersecurity challenges across US healthcare sector for improved resilience
Dealing with OT asset monitoring and discovery to enhance cybersecurity across industrial, OT systems
Dealing with OT asset monitoring and discovery to enhance cybersecurity across industrial, OT systems
Empowering women in ICS cybersecurity, promoting diversity and inclusion remains in focus as S4x24 takes off
Empowering women in ICS cybersecurity, promoting diversity and inclusion remains in focus as S4x24 takes off
Exploring changing terrain of OT/ICS cybersecurity issues, regulatory adherence, new threats
Exploring changing terrain of OT/ICS cybersecurity issues, regulatory adherence, new threats
2024.02.18 Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
US Congressional hearings on cybersecurity highlight urgency to protect critical infrastructure, OT from cyber threats
US Congressional hearings on cybersecurity highlight urgency to protect critical infrastructure, OT from cyber threats
Navigating challenges, technologies, collaborative strategies in industrial threat hunting for critical infrastructure
Navigating challenges, technologies, collaborative strategies in industrial threat hunting for critical infrastructure
Addressing OT cybersecurity threats in transportation sector through enhanced strategies, collaboration
Addressing OT cybersecurity threats in transportation sector through enhanced strategies, collaboration
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity

News

Management & Strategy
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Emerging Trends and Securing the Future of Smart Manufacturing
Cybersecurity Strategies and Best Practices for Manufacturing
New US CISA Recommendations on Security by Design