Podcasts on ICS cybersecurity

The difference between IT security and ICS security

The difference between IT security and ICS security

On IT networks, the focus of a security program is generally preventing the theft of information. The primary focus on control system networks is safety and reliability, and preventing sabotage of those elements.

Listen Here

Why Unidirectional Security Gateways can replace firewalls

Why Unidirectional Security Gateways can replace firewalls

Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks originating on external networks.

Listen Here

Seal the integrity of your logs with Waterfall BlackBox

Seal the integrity of your logs with Waterfall BlackBox

Logs are the baseline information required for quality incident response and forensics. They consist of tracks and hints of the attack and the attacker. How do you keep log repositories more secure than the attacked network?

Listen Here

Unidirectional communications in a bidirectional world

Unidirectional communications in a bidirectional world

Modern enterprises transmit control system information to business networks continuously, and need to send information from business networks into operations networks occasionally. How do you do it securely?

Listen Here

Remote access options for unidirectionally protected networks

Remote access options for unidirectionally protected networks

Remote control is the modern attack method. While unidirectional gateways are designed to defeat remote control, that doesn’t mean we have to give up remote access. Learn about few practical options.

Listen Here