Latest

Level 0 Defense Against the Supply Chain Threat

11 - June 2025

Critical Infrastructure operators have long invested heavily in OT cybersecurity via network segmentation, enforcement of network access restrictions, and deploying perimeter defenses. Yet ...

OT Cyber Reporting

Why So Many OT Cyber Attacks Go Unreported. And Why That’s a Problem for

01 - June 2025

Most OT cyber threats that target critical infrastructure (power, water, ...

The 2025 OT Cyber Threat Report

19 - May 2025

The 2025 OT Cyber Threat Report: What It Tells Us (and What It Doesn’t ...

Rethinking Water Industry OT Cybersecurity Strategy

12 - May 2025

In crisis mode, the water industry needs to look beyond the obvious for ...

The Solution to High False Positives

06 - May 2025

Process-Oriented OT Cybersecurity: The Solution to High False Positives ...

Supply Chain Threats to Cyber Physical Systems

29 - April 2025

Supply Chain Threats to Cyber Physical Systems: The Case for ...

Layered Physical Cybersecurity for Resilient OT environments

21 - April 2025

Cybersecurity for industrial systems isn’t a new problem. But too ...

The Evolving Challenge of Industrial Cybersecurity

09 - April 2025

Cybersecurity for industrial systems isn’t a new problem. But too ...

NIS2: What It Is and Why It Matters for OT Cybersecurity

17 - March 2025

What is NIS2? The Network and Information Security Directive 2 ...

OT Cybersecurity Against Aurora Attacks

21 - January 2025

Protecting the Grid: How Process-Oriented OT Cybersecurity Defends ...

Process-Oriented Defense in OT Cybersecurity

15 - January 2025

The Future of OT Cybersecurity: Aligning with NIST IR with ...

KDSys Launches SigaML² in South Korea

23 - December 2024

KDSys Launches SigaML 2 , an Advanced Multi-Layer OT Cybersecurity Suite, ...

Why a Process-Oriented Approach is Essential?

02 - December 2024

The Big Picture: Operational Technology (OT) systems are now ...

101 Process-Oriented OT Cybersecurity

14 - November 2024

What is Process-Oriented OT Cybersecurity? When a cyberattack is ...

Nozomi Networks Expands OT Security with ARC Embedded Sensors

04 - November 2024

Nozomi Networks has announced its latest innovation: ARC Embedded - the ...

SIGA launching SigaML²

22 - October 2024

We’re thrilled to announce the launch of SigaML² , our innovative ...

From Ransomware Surges to Global Cyber Conflicts: 4 trends of Operational

10 - September 2024

In the ever-evolving landscape of industrial systems, the year 2024 ...

RAMBO Attack Targets Air-Gapped Systems via RAM

08 - September 2024

A new side-channel attack, dubbed RAMBO , can steal data from air-gapped ...

Cyber OT Alert Bulletin: Peach Sandstorm Deploys New Backdoor in Critical

29 - August 2024

Peach Sandstorm, a state-sponsored Iranian hacking group, has deployed a ...

SIGA recipient of the Cyber Excellence Awards 2024

09 - May 2024

We are thrilled to announce that our cybersecurity solutions have been ...

Stuxnet is Back! Or did it Ever Leave?

18 - March 2024

Unveiling the resurgence of Web-Based PLC malware and the imperative need ...

Navigating New OT Security Frontiers: SIGA and Radiflow

28 - February 2024

Yossi (Konstantin) Tarnopolsky, Director of Technology Alliances and APAC ...

SIGA Now Available in the Microsoft Azure Marketplace

19 - February 2024

Microsoft Azure customers worldwide now gain access to SIGA’s unique ...

New Horizons in Cybersecurity with SIGA

01 - February 2024

In an era where the landscape of cybersecurity is perpetually evolving, I ...

The Veolia Ransomware attack in early 2024

24 - January 2024

The recent ransomware attack on Veolia North America sheds light on the ...

4 Operational Technology (OT) Cybersecurity trends in 2024

03 - January 2024

In the ever-evolving landscape of industrial systems, the year 2024 ...

Critical Alert: Cyber threats to the U.S. Water Sector

17 - December 2023

In an unprecedented joint alert, the FBI, CISA, NSA, EPA, and INCD warn of ...

Safeguarding Against Cyber-Physical Threats: SIGA’s Level 0

22 - November 2023

In the wake of the recent cyber-physical attack on Ukraine's electrical ...

Four OT attack scenarios which require SIGA’s Level 0 detection

05 - September 2023

Attack Scenario 1: (Un)authorized Access Cyber menaces do not stem ...

Living-off-the-land (LOTL) attacks

21 - August 2023

Following the recent assault of the “Volt Typhoon” group on US ...

Level 0 recognized by NIST as a best-practice for OT cybersecurity

01 - May 2023

The National Institute of Standards and Technology (NIST) released a guide ...

SIGA @ Hannover Messe 2023

20 - March 2023

Come join SIGA during Hannover Messe 2023 (17-21 April)! Our VP Sales, ...

Manufacturing Application Brief

16 - February 2023

Manufacturing application brief

Ransomware in OT – keep your eyes on the ball!

11 - January 2023

OT vulnerabilities are here to stay. The security policies we thrive to ...

Securing Operational Technology (OT) systems

19 - December 2022

Frost and Sullivan together with Applied Risk have published an ...

Relentless cyber-attacks around the world

15 - December 2022

As cyber threats are growing ever-more intense and frequent, it's time for ...

SIGA @ INTECH 2022

04 - December 2022

SIGA participated at INTECH 2022, a leading industrial conference, ...

SIGA @ Energie report

24 - November 2022

ARES's CEO Jürgen Weiss spoke to the Energie Report  magazine and told ...

SIGA’s CRO, Amir Gil speaks at ICS 7th edition

20 - November 2022

SIGA's CRO, Amir Gil spoke at ICS 7th edition held on the 20th of ...

SIGA @ SPS 2022

10 - November 2022

SIGA participated at the Smart Production Solutions (SPS) conference in ...

SIGA’s CEO speaking at a major Water industry event

08 - November 2022

SIGA’s CEO, Amir Samoiloff attended a unique roundtable gathering water ...

SIGA IS THRILLED TO ANNOUNCE ITS PARTNERSHIP WITH CYWAY

08 - September 2022

Cyway  is a Dubai-based emerging leader in value-add cybersecurity ...

CRITICAL INFRASTRUCTURE SECURITY SHOWDOWN (CISS) – RESULTS

01 - September 2022

SHIELDS-UP

08 - May 2022

In light of the waging Russian war on Ukraine over the past two months and ...

THE NOTORIOUS PIPEDREAM MALWARE

30 - April 2022

A new advisory based on a joint federal and private sector investigation ...

ROCKWELL PLCS VULNERABILITIES YET TO FURTHER EMPHASIZE THE IMPORTANCE OF

14 - April 2022

A new advisory based on a joint federal and private sector investigation ...

“THE NEXT EVOLUTION OF OT CYBER SECURITY”

08 - April 2022

A new advisory based on a joint federal and private sector investigation ...

PARALLEL REFERENCE MONITORING

03 - March 2021

HMI’s Can be Fooled! Detect anomalies before they damage your critical ...

THE ATTACK ON U.S. CYBERSECURITY FIRM FIREEYE AND THE SOLUTION

10 - December 2020

YESTERDAY, DEC. 08 TH ,  IT WAS ANNOUNCED THAT AN  UNPRECEDENTED ...

SIGA IS PARTICIPATING IN THE ‘SWEDEN INNOVATION DAYS’

17 - October 2020

NOW, October 17th -19th, SIGA is taking part in a three-day worldwide ...

NEW REGULATORY FRAMEWORK BY ISRAEL MINISTRY OF ENVIRONMENTAL –

15 - September 2020

Highlights the significance of Cybersecurity Monitoring at ICS ...

SUBSCRIBE

    CATEGORIES