ripple.png

Blog

Mind the Gap - a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are[...]

Looking to Improve your ICS Security Strategy? Try Active Monitoring

It sounds obvious and has been said before, but without clear visibility into your ICS assets and the various communications occurring on the network, it's impossible to detect and mitigate[...]

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate[...]

What the Vulnerabilities in Schneider Electric Tools Mean for ICS Security

On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide hackers with a foothold in America’s[...]

US: Russian Government Hackers are Targeting America's Critical Infrastructure Sectors

 The recently updated report by  the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the advanced persistent threat (APT)[...]

Hackers are targeting ICS Systems. How prepared are you for recovery?

It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery?