A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.
Organizations are increasingly failing to secure internet-facing industrial control systems (ICS) that manage critical infrastructure, putting them at risk of ICS-specific malware.
A recent survey revealed that IT security attacks targeting the industrial sector are growing more frequent and more complex due to human error, lack of adequate security technology and other factors.
Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.
Nuclear power plants are now being targeted by sophisticated cybercrime groups. Is this the precursor to a full-scale malware meltdown?
To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
Smart cities offer big benefits for citizens and governments alike, but are they at increased risk of potentially crippling malware attacks?
A new potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming IIoT and ICS devices.
Recent research from the firm Dragos has shed some light on the actual number malware infections affecting industrial control systems (ICS).