ripple.png

Blog

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate[...]

What the Vulnerabilities in Schneider Electric Tools Mean for ICS Security

On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide hackers with a foothold in America’s[...]

Ramifications of the Newly Released CERT Report

 The recently updated report by  the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the advanced persistent threat (APT)[...]

It's Not A Matter Of "IF" but "WHEN"

It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery? 

The 90’s Called – They want their Passive-Only monitoring solutions back

The words Active or Passive can mean many different things, depending on who you ask. Some may say ‘Active’ means it’s ‘blocking’ or preventing things from happening. Other may say it means doing[...]

Why Food & Beverage Companies Should Crack Down on Cyber Threats to ICS

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods.

But how can we be sure that the products we bring home are safe to eat and drink?