Back in 1982, the CIA uncovered a plot by the Soviet Union to steal industrial software for controlling its rapidly expanding network of natural-gas pipelines. In response, the agency modified the ...
We know of control system cyber attacks in the electric power, water, oil and gas, building controls, and transportation sectors that cause physical damages. Another cyber threat that could represent ...
Network cybersecurity and control system organizations have fundamentally different objectives and criteria when it comes to identifying cyber incidents ...
The International Society of Automation (ISA) has release its ISA-TR62443-2-2-2025, Security for Industrial Automation and Control Systems, Part 2-2: IACS Security Protection Scheme. This technical ...
A federal lab aims to make the process of threat emulation more efficient, so that security teams can more quickly test whether their systems are proof against the latest attacks. An AI-based system, ...
Chuck Weissenborn, public-sector chief technology officer at Dragos, said cybersecurity has focused on confidentiality, integrity, and availability, but as the discussion in the last session noted, ...
Enterprise security teams are losing ground to AI-enabled attacks — not because defenses are weak, but because the threat model has shifted. As AI agents move into production, attackers are exploiting ...