New risks occur as IT and OT converge and become increasingly connected as many control systems are now overlapping with enterprise systems to provide accessible, secure, information that is visible across organisations.
Security researchers have found a flaw in the emergency alert warning siren system used by many local authorities - could be sounded by hackers, research finds.
Today the risk to industrials is digital. It comes through knowing specific technical protocols and manipulating them to control an asset. Or obfuscating digital machine readings, blinding operators to thresholds being exceeded.
The internet is more than an infrastructure - it mediates human behaviour so it can have unprecedented impact - threatening our survival. It can be manipulated to constitute an insider threat on an unprecedented scale.
Mirai and Satori show the potential malicious actors can have when armed with malware and lots of unsecured IoT connected devices to target.
SC Congress 2018: Register by 1.0 pm Wednesday 14th to get your FREE day pass on Thursday 15 February, at the ILEC Conference Centre, 47 Lillie Road, London, SW6 1UD.
The first documented cryptominer attack on a SCADA network of a critical infrastructure operator was seen in the wild.
EU NIS Directive: As the implementation of the first true piece of cyber-security legislation draws near, Jalal Bouhdada discusses its potential impact on 'operators of essential services.
The latest research suggests, within just two years, the security situation for SCADA has got worse to the tune of an average increase of 1.6 vulnerabilities per application tested.
In a wide ranging interview, Lloyd Rush, UK Cyber Defence Centre manager, Airbus Defence and Space provides SC with insight into the latest attack trends, including fileless, plus the threat of criminal AI use and SOC responses.
Attacks on critical national infrastructure are growing in number and sophistication. So how big is the UK's risk?
Driving the Autumn Budget - speed of introduction causes concerns over safety of autonomous vehicles, including terrorist take-over, plus where responsibility lays - user, manufacterer (hardware/software) and regulator.
A Boeing 757 airliner was successfully hacked by a team of public and private security professionals, according to a US Department of Homeland Security (DHS) official.