Blog

What the Vulnerabilities in Schneider Electric Tools Mean for ICS Security

On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide hackers with a foothold in America’s[...]

US: Russian Government Hackers are Targeting America's Critical Infrastructure Sectors

 The recently updated report by  the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the advanced persistent threat (APT)[...]

Hackers are targeting ICS Systems. How prepared are you for recovery?

It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery? 

The 90’s Called – They want their Passive-Only monitoring solutions back

The words Active or Passive can mean many different things, depending on who you ask. Some may say ‘Active’ means it’s ‘blocking’ or preventing things from happening. Other may say it means doing[...]

Why Food & Beverage Companies Should Crack Down on Cyber Threats to ICS

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods.

But how can we be sure that the products we bring home are safe to eat and drink?

The Challenges of Securing Industrial Control Systems from Cyber Attacks

The emergence of cyber threats is forcing the industrial sector to take a long, hard look at how industrial control systems (ICS), and specifically industrial controllers are protected.