Blog

When covering for risk, best practice teaches us to categorize, measure and profile our vulnerabilities. Intel - the world’s largest and most highly valued semiconductor chip maker and inventor of the processors found in most personal computers - knows this process well. Countless tests are...

The Department of Homeland Security recently stated that it had received reports of 59 cyber incidents at energy facilities last year- up nearly a third from the previous year. Those 59 were only a fraction of the 290 incidents the DHS combatted last year across...

Recently we’ve received a lot of interest from water and waste management facilities regarding our Unidirectional Security Gateway- which is making me wonder what’s brought this on?  Let’s look at the facts. The primary source for cyber risks in water and waste management facilities comes...

The 2016 racing season proved to be successful, but it was in contrast to previous years where the team constantly raced wheel-to-wheel together. The team competed together for the first couple of races, where each driver posted F1000 wins. However, the planned race schedule was...

This past month we have witnessed another win in the world of ICS security standards coming from France’s preeminent information systems security standards body.  The French are known for being the best in the world at many things, it would be silly to even list...

by Mike Firstenberg At the annual EnergySec Conference, no less than 8 speakers used a phrase akin to “It’s not if ...

The Ukraine power grid cyberattack continued to dominate cybersecurity news in February as various researchers reported findings from their investigations of the incident. In other news, researchers discovered sustained cyberattacks against Japan’s critical infrastructure, most likely perpetrated by a nearby nation state. Amidst these reports,...

It’s no surprise the cyberattack on Ukraine’s power grid dominated industrial control system (ICS) cybersecurity news in January. Following the news of the power outages and subsequent discovery of malware and other signs of a purposeful network intrusion, cybersecurity experts, DHS and others have revealed...