FEATURE - ANOMALY AND BREACH DETECTION EMPOWERS CYBERSECURITY EFFORTS
10.20.17

Anomaly and Breach Detection Empowers Cybersecurit...

As discussed in a recent ARC Market Analysis Report, anomaly and breach detection is one of the hottest markets in industrial cybersecurity. But, as is true for...

Read more
FEATURE - Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017
08.30.17

Indegy’s Take on Gartner’s Market Guide for Operat...

 Gartner recently published the “Market Guide for Operational Technology Security”. One of the report’s key takeaways is that translating IT security practices ...

Read more
FEATURE - THE INTELLIGENCE CYCLE_ SECURITY INFORMATION IN MOTION (1)
08.22.17

The Intelligence Cycle: Security Information in Mo...

Several years ago, I decided to take a course on Strategic Intelligence Systems in order to solidify my ever-growing interest for the topic. My affinity for Jam...

Read more
FEATURE - ICS-CERT Annual ICS Summary Report 2016
07.18.17

About the ICS-CERT Annual ICS Summary Report 2016

In case you missed the report, ICS-CERT just released their Annual 2016 Industrial Control Systems Assessment Summary Report. Leveraging NIST SP-800-53 Categori...

Read more
FEATURE - WHAT THE NEW EXECUTIVE ORDER REALLY MEANS FOR CRITICAL INFRASTRUCTURE
07.06.17

What the New Executive Order Really Means for Crit...

In fulfillment of one of his campaign trail promises, President Trump signed off on a new a Cybersecurity Executive Order that places Critical Infrastructures, ...

Read more
FEATURE - Petya The Ransomware That can Wipe Out Your ICS Automation Systems and Files
07.03.17

Petya: The Ransomware That Can Wipe Out Your ICS A...

 On June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...

Read more
FEATURE-DETECTINGANDMITIGATINGCRASHOVERRIDE - NEW
06.30.17

Detecting and Mitigating CRASHOVERRIDE: ICS-Tailor...

Recently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...

Read more
FEATURE - WHY WANNACRY WAS A WAKE UP CALL FOR CRITICAL INFRASTRUCTURE SECURITY-1
06.27.17

Why WannaCry Was a Wake Up Call for Critical Infra...

Last week Honda halted production at a vehicle plant for a day after finding the WannaCry ransomware, that struck globally earlier this year, in its network. Wh...

Read more
FEATURE - Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017
06.15.17

How “Cool” is Indegy? - Very, According to Gartner

Indegy Recognized for Innovations in Security for Industrial IoT Indegy was recognized by Gartner as a "Cool Vendor" for Industrie 4.0. We are honored and proud...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy