The increased use of automated control systems to manage drug formulations and product quality (particularly for combination drugs) is creating new security risks for...
Hi, what are you looking for?
The increased use of automated control systems to manage drug formulations and product quality (particularly for combination drugs) is creating new security risks for...
In the decade since the Stuxnet worm was discovered, multiple attacks that have been launched against operational technology (OT) networks including Shamoon, Havex, Wannycry,...
It was not that long ago when one of the measures of a company’s maturity was whether it had its own data center or...
In the 1996 thriller, Mission Impossible I, Ethan Hunt hacks the HVAC system of a building to breach its security controls and carry out...
Passive and Active Threat Detection is Needed to Secure Operational Technology (OT) Environments
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is...
OT Personnel Need to be Proactive About SecurityOctober is officially National Cyber Security Awareness month, and this year one of the program’s key messages...
Actively Checking Device Integrity Can Detect Changes that Evade IP-based Monitoring
The National Institute of Standards and Technology (NIST) recently updated its cybersecurity framework (CSF), rolling out changes to all five pillars: Identify, Protect, Detect,...
Tell any IT professional that the computer running the electrical grid has not been updated in 20 years, or that the machine that controls...
Adversaries Most Likely Want to Acquire a “Red Button” Capability That Can be Used to Shut Down the Power Grid
Last December, a malware variant specifically designed to attack industrial safety systems was discovered.