Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are[...]
It sounds obvious and has been said before, but without clear visibility into your ICS assets and the various communications occurring on the network, it's impossible to detect and mitigate[...]
Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate[...]
On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide hackers with a foothold in America’s[...]
The recently updated report by the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the advanced persistent threat (APT)[...]
It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery?