Released this week: Global ICS & IIoT Risk Report

Released this week: Global ICS & IIoT Risk Report

Industrial and critical infrastructure organizations that rely on industrial control systems (ICS) to run their businesses — such as firms in energy and utilities, oil & gas, pharmaceutical and chemical production, food & beverage, and other…

The CANOPY WING Vulnerability: Weaponizing the Weakness

The CANOPY WING Vulnerability: Weaponizing the Weakness

Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit – is repeated many times every day. Now more than ever companies must be aware of two perspectives: what a system is…

Staying secure in the smart era: Three rules for cybersecurity

Staying secure in the smart era: Three rules for cybersecurity

Almost half of the manufacturers have fallen victim to cybercrime, according to the Cyber Security Manufacturing Report 2018, published by EEF. One of the biggest challenges for manufacturers is choosing from the range of products and…

US Cities Exposed: Industries and ICS security

US Cities Exposed: Industries and ICS security

Today, 54% of the world’s population lives in urban areas, a proportion that is expected to increase to 66% by 2050. [2] According to the 2010 US Census, that number is even higher in the US,…

CEO Insights: Why Cybersecurity is an enablement of IIoT

CEO Insights: Why Cybersecurity is an enablement of IIoT

Lucian Fogoros: How would you rate the level of cybersecurity awareness among industry in general? What level of uptake do you see regarding the level of cybersecurity best practices and systems? Joseph Saunders: With the many…

Protect Critical Infrastructure With Runsafe Security’s Alkemist

Protect Critical Infrastructure With Runsafe Security’s Alkemist

Hackers are having increasing success penetrating the operating technology and industrial control systems underpinning data centers, utilities, manufacturing plants. As organizations incorporate smart devices, connect to the Internet of Things, and utilize the cloud to optimize…

A High Assurance Approach to Securing Network Infrastructure

A High Assurance Approach to Securing Network Infrastructure

The inconvenient truth is that our current cybersecurity tools and methods are not a match for today’s sophisticated attackers who will target any exposed surface looking for vulnerabilities. Attackers need to only succeed once, while defenders…