SolarWinds is the tip of the iceberg - The recent SolarWinds software supply chain breach is a clear indication that strong OT cybersecurity is a must-have in today's threat environment. A Help Net Security Article by CEO, Lior Frenkel
SolarWinds is the tip of the iceberg - The recent SolarWinds software supply chain breach is a clear indication that strong OT cybersecurity is a must-have in today's threat environment. A Help Net Security Article by CEO, Lior Frenkel
The criminal world is moving to cyber and Israel is at the top of the list of targets of hackers in the world. A new article in Calcalist, including Lior Frenkel's analysis of the situation
A timely and insightful exploration of supply chain security issues with Spencer Wilcox, the CSO and Executive Director of Technology at PNM Resources
Daniel Ehrenreich joins us to explore practitioner experience of IT/OT Integration, 62443 training and the ICS CyberSec conference every year in Israel
P&I diagrams connect process engineering to control engineering. Sarah Fluchs of Admeritia explains what we need to connect control engineers with security engineers
The massive attack on national infrastructures in Australia, only recently publicized, as well as the attack on Israel’s water infrastructure, do well to illustrate the threats prevalent in the world
Without security, the rail system can be neither reliable nor safe. Learn more in the Railway Gazette International article
Dr. Jesus Molina discusses the security challenges facing rail networks and systems and how railways can stay up-to-date on the best cybersecurity measures
Most building automation is poorly secured, which is a big problem for hospitals. Gilad Zinger of PWC joins us to explore vulnerabilities and what hospital CISO's are starting to do about the problem.
Ransomware continues to evolve and sophisticated phishing attacks are the most popular attack vector. James McQuiggan of KnowBe4 explores ransomware, phishing and what we can do about it.
Internet communications are creeping into electric distribution systems. James McCarthy and Don Faatz join us from the NIST NCCoE to talk about this project & others where they provide detailed "how to" industrial security documentation
Learn about the Beer ISAC movement, the Beer ISAC Podcast, the Russian industrial security community and other initiatives with Anton Shipulin and Vladimir Dashchenko of Kaspersky
Explore a targeted ransomware attack at a pharmaceuticals plant, the incident response and how hard it is to just "restore from backup" with Ofer Shaked, Co-Founder & Chief Technology Officer at SCADAfence
Author, researcher and industrial security pioneer Jake Brodsky explores the security and operational benefits of configuring self-consistency checks into industrial control systems
Derek Harp, CEO and Co-Founder of CS2AI and Founder of The Cyber List speaks to the history and future of CS2AI, and provides some insights into cyber security training for non-cyber-savvy audiences
Roman Arutyunov, Co-Founder of Xage Security, explores intrinsically-distributed, authority-based blockchains for industrial security in the form of the Xage Security Fabric
Marco Blume, Product Manager for Embedded at WIBU Systems introduces discrete manufacturing and explores how intellectual property protection, safety and cybersecurity work in that vertical and others.
Threatpost talks to Lior Frenkel, CEO and co-founder of Waterfall Security about the top cybersecurity threats facing the industrial, manufacturing and critical infrastructure industries
Andrew Ginter, and Edward Amoroso, talk about how new approaches are needed to gain defensive advantage over already-capable cyber adversaries
Andrew Ginter and Edward Amoroso talk about how unidirectional security gateways enable safe IT/OT integration. Podcast
Andrew Ginter, VP of Industrial Security at Waterfall, and Edward Amoroso, CEO of TAG Cyber, talk about SCADA vulnerabilities in ICS architectures
In this podcast, Andrew Ginter and Edward Amoroso talk about how the traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value
In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about industrial control system security
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about remote access options for unidirectionally protected networks
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, explains how, in order to keep log repositories more secure than the attacked network, Waterfall developed the BlackBox
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, explains how you can send information into these sites securely.
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about Unidirectional Security Gateways. They can replace firewalls in industrial network environments, providing absolute protection to control systems and o
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about the difference between IT security and ICS security
Restoring trust in network information for cyber-attack response teams and forensics”.