Security News > 2017 > July > Inadequate Boundary Protections Common in Critical Infrastructure: ICS-CERT (Security Week)
2017-07-14 13:11
The assessments conducted by the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in 2016 showed that inadequate boundary protection has remained the most prevalent weakness in critical infrastructure organizations. read more
News URL
Related news
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks (source)
- Critical security hole in Apache Struts under exploit (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
- The High-Stakes Disconnect For ICS/OT Security (source)
- CERT-UA warns against “security audit” requests via AnyDesk (source)
- CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)