Three Key Ways to Ensure NERC Compliance: The $10 Million Wake Up Call
For most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every othe...
Read moreFor most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every othe...
Read moreActive is probably the biggest buzzword nowadays in the field of industrial cyber security. But what is it? How does it work? Is it safe? Do I eve...
Read moreActive is probably the biggest buzzword nowadays in the field of industrial cyber security. But what is it? How does it work? Is it safe? Do I even need it?
Read moreTwo years ago, when I took over my current position as Security Architect in a manufacturing company, one of the biggest challenges my new boss laid out for me ...
Read moreMost industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptoc...
Read moreGartner recently published the “Market Guide for Operational Technology Security”. One of the report’s key takeaways is that translating IT security practices ...
Read moreSeveral years ago, I decided to take a course on Strategic Intelligence Systems in order to solidify my ever-growing interest for the topic. My affinity for Jam...
Read moreIn case you missed the report, ICS-CERT just released their Annual 2016 Industrial Control Systems Assessment Summary Report. Leveraging NIST SP-800-53 Categori...
Read moreIn fulfillment of one of his campaign trail promises, President Trump signed off on a new a Cybersecurity Executive Order that places Critical Infrastructures, ...
Read moreOn June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...
Read moreRecently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...
Read moreLet us show you best
practices for protecting your
ICS network.
Indegy, a leader in ICS cybersecurity, protects critical infrastructure from cyber threats, malicious insiders and human error. The Indegy Cyber Security Suite arms operational technology teams with full visibility, security and control by combining hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks.
Comments (0)
You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy