CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
ICS Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

ICS Security

Petroleum plant on sky twilight background showing Iranian hackers APT33 threatening ICS security
Cyber SecurityNews

Iranian Hackers APT33 Now Threatening ICS Security

December 5, 2019
As part of a major change in strategy, it now appears that Iranian hackers APT33 are shifting their focus to critical infrastructure targets, threatening ICS security. Read More
Network Command Centre showing the ICS security vulnerabilities detailed in new CyberX report
Cyber SecurityNews

New CyberX Report Details ICS Security Vulnerabilities

November 4, 2019
Latest CyberX study analyzed real-world traffic on 1,800 production networks and uncovered an alarming number of IoT and ICS security vulnerabilities that put them at greater risk of cyber attacks. Read More
Night view of refinery plant showing the importance of ICS security to prevent cyber attacks on critical infrastructure
Cyber SecurityInsights

The Invisible Attackers Waiting at Your Industrial Systems Gate: Be Wary, Be Prepared, Stay Resilient

July 8, 2020
Without a pragmatic approach to ICS security, businesses could face serious consequences and shutdown of production when vulnerabilities are exploited by threat actors. Read More
Substation with power lines and transformers showing cybersecurity professionals’ concerns on state of ICS security
Cyber SecurityNews

Tripwire Report Surveys Cybersecurity Professionals On State of ICS Security

October 21, 2019
Recent Tripwire survey reported 93% of cybersecurity professionals are concerned over ICS security and how potential cyber attacks could shut down operations or lead to customer-impacting downtime. Read More

Latest

Visual of smart digital city showing Big Tech's privacy push

“Better, but Still Not Good” – Making Sense of Big Tech’s Privacy Push

Power lines in the spring in a green wheat field showing SolarWinds backdoor in electric utilities

Utility Regulator Says SolarWinds Backdoor Was Downloaded by 1/4 of Electric Utilities on the North American Power Grid

Telegram messenger app on the screen of a smartphone showing phishing attacks using Telegram bots

Phishing Attacks Actively Using Alternative Exfiltration Methods Including Google Forms and Telegram Bots

Lots of gift cards on table showing sale on dark web

Hacker Sold 895,000 Gift Cards Worth $38 Million and 330,000 Payment Cards on a Russian Dark Web Forum

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results