Michael Yehoshua
Recent Posts
Navigating the Intersection of IT and OT
Securing Your Plant Without Shutting It Down If one of your organization’s goals for 2023 is to implement a robust OT/ICS cyber security solution (and here’s why it absolutely should be, even if...
OT Asset Discovery: Improving Security Posture Using Device Type Learning
A SCADAfence New Feature report The first question we're usually asked by any CISO who wants to increase their OT security posture is about asset visibility and management. Gathering a comprehensive...
This Thanksgiving, Be Thankful for OT Security | SCADAfence
Thanksgiving – when families get together and express gratitude for everything they have, accompanied by good food and hopefully great football. For most families and network security teams who just...
4 Reasons for CISOs to Maintain The OT Security Budget During Recession
Psst….Don’t look now, but the global economy might be entering a recession. Yeah, yeah, you already know that. Everyday you’re reading about tech industry layoffs, stock market dips, and general...
Top OT Security Solutions: Gartner's Advice For Protecting Your Network
If you are the person in your organization responsible for securing an OT network, you are probably feeling very popular these days. Your inbox is no doubt full of emails inviting you to ‘hop on a...
5 Best Practices for Operational Technology (OT) Security
Why Do You Need Operational Network Security? Modern operational technology (OT) networks are evolving due to developments such as the rise Industrial Internet of Things (IIoT), Industry 4.0, smart...
NSA and CISA Issue Joint Advisory for OT/ICS Networks
The US National Security Agency (NSA) and the Cybersecurity Infrastructure Security Agency (CISA) have issued a joint advisory specifically for OT/ICS networks. The advisory offers guidance on ways...
Innovative OT Security Solutions. SCADAfence's largest product rollout
Over time, we have learned that we develop products not for our own innovation, but for you the customers, to help improve your OT security. In 2021, we were excited to launch three newly designed...
Top 20 PLC Secure Coding Practices Released
Over the years, programmable logic controllers (PLC) have been insecure by default. Security good practices have been created and adopted for IT which can be seen in OWASP’s Top Ten Vulnerabilities...
Takeaways for Security Leaders From The Oldsmar Water Attack
Over the last few days, cybersecurity journalists and the ICS security community have been discussing the Oldsmar Florida water system cyber attack, almost ad nauseam. While many people have been...
Cocktail Book: Raise Your Drinks & Your OT / IoT Security Posture
In today's stressful times, we can all use a refreshing beverage. Seriously, with the uncertainty around the the rising ransomware incidents in OT networks, we can all use some brightness in our...
Managing Your Unmanageable OT and IT Infrastructure
As industrial systems become increasingly connected to IT, Cloud and ERP systems, they become increasingly exposed to cyber threats such as ransomware. In fact, cyber threats for industrial control...
Governance - 3rd Party Application & Free Onboarding Until 2021!
It’s true, the SCADAfence Governance Portal can now connect to any third-party application through Syslog or rest-API and we’re providing the entire on-boarding for free until the end of this year....
SCADAfence Researchers: Vulnerability in Mitsubishi Electric MELSEC iQ-R Series CPU DoS
As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities and attack techniques. CVE-2020-13238 is a...
Iranian Hackers Target Israel’s Water Supply - Prevent Attacks
Iran Launches Cyber Attacks on Israeli Water Facilities According to a Fox News report, Iranian cyber attackers used American servers to launch their attacks on the Israeli water infrastructure...
SNAKE / EKANS Ransomware: Deploying OT-Oriented Malware
Until now, the use of malware specifically designed to attack industrial control systems has been confined to fairly rare high-level nation-state attacks such as those which targeted nuclear...
BMS Systems: The Security Risks of Building Management Systems
An Intro to Building Management Systems (BMS) Before we dive into it, a Building Management System (BMS), a.k.a. “Smart Building Technology,” is an intelligent microprocessor-based controller network...
New Orleans & UK Government Slammed by Cyberattacks
New Orleans & UK Government Slammed by Cyberattacks
Ransomware Attack At Mexico’s Pemex Could Have Been Avoided
RYUK Ransomware Cripples Mexico’s State-Owned Oil & Gas Company
Proud To Be A Member Of The OT Cyber Security Alliance
As the global technology leaders in OT Security, we’re very proud to be founding members of a new alliance that provides technical and organizational frameworks for safe and secure operational...
Strengthen Your Security: Embrace Industry 4.0 Securely
Strengthening your Industry 4.0 Cybersecurity Posture The fourth industrial revolution is all about connectivity. While many manufacturers and industrial network operators want to take advantage...
Firewalls Have Proven to be Far From Impenetrable
No single solution can offer a silver bullet for cybersecurity. Nevertheless, vital facilities such as power stations and manufacturing plants are currently in danger of relying too heavily on...
5G Causing Attack Vulnerability Global Industries & Utilities?
What is 5G technology?
We are SCADAfence
SCADAfence was founded due to the dire need for technology that secures Operational Technology (OT) networks. As our world evolves, demand for everything from automated mass production to smart city...