Blog

Looking to Improve your ICS Security Strategy? Try Active Monitoring

It sounds obvious and has been said before, but without clear visibility into your ICS assets and the various communications occurring on the network, it's impossible to detect and mitigate[...]

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate[...]

What the Vulnerabilities in Schneider Electric Tools Mean for ICS Security

On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide hackers with a foothold in America’s[...]

US: Russian Government Hackers are Targeting America's Critical Infrastructure Sectors

 The recently updated report by  the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the advanced persistent threat (APT)[...]

Hackers are targeting ICS Systems. How prepared are you for recovery?

It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery? 

The 90’s Called – They want their Passive-Only monitoring solutions back

The words Active or Passive can mean many different things, depending on who you ask. Some may say ‘Active’ means it’s ‘blocking’ or preventing things from happening. Other may say it means doing[...]