![40 years of cyber targets](https://waterfall-security.com/wp-content/uploads/2024/06/40yearscybertargetsblog-300x169.png)
40 Years Deploying Cyber Targets
For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
Ransomware is the most common cyber attack causing OT outages – all Windows machines encrypted. What if we could “press a button” and have everything working again in seconds or minutes? Alex Yevtushenko of Salvador Technologies joins us to look at new technology for rapid recovery.
Cyber-Informed Engineering (CIE) offers a new engineering-friendly approach to understanding and addressing cyber threats that have the potential to impair worker safety and damage long-lead-time equipment in Mining & Metals operations.
What happens when we close the loop in mining operations? How can we prevent Internet-exposed services being compromised?
Water systems cybersecurity expert Mariano Martin Tirado of Acciona shares with Waterfall his insights about protecting Water Utilities and Wastewater treatment plants.
The Mitre CWE – Common Weakness Enumeration is database talks about kinds of problems that can show up in the future – future zero days – rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners and operators use it.
Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to discuss AI and the industrial cyber risks and threats it poses to the digital transformation of the energy industry.
When it comes to securing OPC DA, nothing compares to the security that a unidirectional gateway provides.
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes