Publications

Reports
News

Filter

13 October 2020

What it feels like for a turbine

Alexander Korotin,

Evgeniya Potseluevskaya,

Gleb Gritsai,

Radu Motspan,

Sergey Andreev,

Sergey Sidorov

The goal of the article is to raise awareness on security of Distributed Control Systems (DCS), propose a methodology for assessment, and a remediation strategy. Defenders are always behind attackers, and this publication is trying to balance things out.

15 September 2020

The State of Industrial Cybersecurity 2020

In 2020 ARC Advisory Group on behalf of Kaspersky conducted a survey on the state of industrial cybersecurity, as well as the current priorities and challenges of industrial organizations. More than 330 industrial companies and organizations across the globe were surveyed online and 10 industry representatives were interviewed at trade fairs and ARC forums worldwide.

17 January 2019

Challenges of industrial cybersecurity

Evgeny Goncharov

Factors that have a significant effect, now and going forward, on the threat landscape, on the development, implementation, and use of organizational and technical measures to protect industrial facilities, and the main issues associated with ensuring the cybersecurity of industrial enterprises.

APT 5
Companies and organisations 9
Industrial control systems 3
Industries 16
Laws and regulation 3
Malware 17
Products and services 12
Technologies 14
Types of threats 9

Select an author

Select a date

Filter

APT 1
Companies and organisations 50
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 3
Malware 25
Products and services 58
Technologies 13
Types of threats 23

Select an author

Select a date

Select a tag

APT 5
Companies and organisations 9
Industrial control systems 3
Industries 16
Laws and regulation 3
Malware 17
Products and services 12
Technologies 14
Types of threats 9

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 50
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 3
Malware 25
Products and services 58
Technologies 13
Types of threats 23

Select an author

Select a date

Filter