40 Years Deploying Cyber Targets
For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
The Mitre CWE – Common Weakness Enumeration is database talks about kinds of problems that can show up in the future – future zero days – rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners and operators use it.
Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to discuss AI and the industrial cyber risks and threats it poses to the digital transformation of the energy industry.
When it comes to securing OPC DA, nothing compares to the security that a unidirectional gateway provides.
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes
Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.
From supply chain to Active Directory to segmentation designing security into ICS products is hard. Jake Hawkes walks us through how security gets built into AVEVA Enterprise SCADA.
The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies need to increase automation and network connectivity to maintain strategic military, governance, and economic advantages.
The fundamental difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyber attacks are sharply, qualitatively different on IT vs OT networks…