FEATURE - ICS_SCADA SECURITY FOR BEGINNERS – QUICK KNOWLEDGE TO SURVIVE THE INDUSTRIAL CONTROL LANDSCAPE
05.15.18

ICS/SCADA Security For Beginners – Quick Knowledge...

Two years ago, when I took over my current position as Security Architect in a manufacturing company, one of the biggest challenges my new boss laid out for me ...

Read more
FEATURE-ISMALWAREHIDINGINYOURICSNETWORK_- NEW
05.14.18

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptoc...

Read more
FEATURE - Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017
08.30.17

Indegy’s Take on Gartner’s Market Guide for Operat...

 Gartner recently published the “Market Guide for Operational Technology Security”. One of the report’s key takeaways is that translating IT security practices ...

Read more
FEATURE - THE INTELLIGENCE CYCLE_ SECURITY INFORMATION IN MOTION (1)
08.22.17

The Intelligence Cycle: Security Information in Mo...

Several years ago, I decided to take a course on Strategic Intelligence Systems in order to solidify my ever-growing interest for the topic. My affinity for Jam...

Read more
FEATURE - ICS-CERT Annual ICS Summary Report 2016
07.18.17

About the ICS-CERT Annual ICS Summary Report 2016

In case you missed the report, ICS-CERT just released their Annual 2016 Industrial Control Systems Assessment Summary Report. Leveraging NIST SP-800-53 Categori...

Read more
FEATURE - WHAT THE NEW EXECUTIVE ORDER REALLY MEANS FOR CRITICAL INFRASTRUCTURE
07.06.17

What the New Executive Order Really Means for Crit...

In fulfillment of one of his campaign trail promises, President Trump signed off on a new a Cybersecurity Executive Order that places Critical Infrastructures, ...

Read more
FEATURE - Petya The Ransomware That can Wipe Out Your ICS Automation Systems and Files
07.03.17

Petya: The Ransomware That Can Wipe Out Your ICS A...

 On June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...

Read more
FEATURE-DETECTINGANDMITIGATINGCRASHOVERRIDE - NEW
06.30.17

Detecting and Mitigating CRASHOVERRIDE: ICS-Tailor...

Recently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...

Read more
FEATURE - WHY WANNACRY WAS A WAKE UP CALL FOR CRITICAL INFRASTRUCTURE SECURITY-1
06.27.17

Why WannaCry Was a Wake Up Call for Critical Infra...

Last week Honda halted production at a vehicle plant for a day after finding the WannaCry ransomware, that struck globally earlier this year, in its network. Wh...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy