ICS Security

  /  ICS Security

Re-Emagineering the CyberSecurity driven convergence of OT to IIOT The exploitation and sabotage of resources has been a concern to mission critical operations since the dawn of the industrial age. With the advancement of Information Technology (IT), opportunities to compromise, corrupt

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt

The practice of cyber security has changed dramatically in the past few years, presenting a significant challenge to management teams across all industries and business domains. As IT security teams become accountable for securing Operational Technology (OT) and OT-specialist teams

Supply chain attacks like the recent SolarWinds hack are now front-page news, and cybersecurity steps must be taken to reduce the risk these attacks pose to critical systems. A platform that enables end users to manage the security of their

President Biden is walking into an embattled and in some ways grim cyber security picture. As we know, the end of 2020 brought to our attention a months-long global cyber-espionage campaign, The broader public will almost certainly never know the

Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source software (OSS) providers. Oftentimes, device manufacturers that have outsourced development

In a recent article in The Guardian regarding the SolarWinds cybersecurity attack, security technologist Bruce Schneier said, "We have a serious problem. We don't know what networks they are in, how deep they are, what access they have, what tools they left," Schneier said. The

As the COVID-19 pandemic continues to impact business and the economy worldwide, companies in every industry are using a critical eye to prioritize their operations amidst shrinking budgets and a catalog of unknowns. This includes exploring automation technologies that can

The ability to remotely manage systems including HVAC units, vehicle fleets, manufacturing equipment and other operational technologies (OT) is seen as a tremendous time and money saver. However, a failure to properly protect OT assets can lead to data theft,

You don't have permission to register