ICS Security

  /  ICS Security

New year, new beginning, new events! There is nothing more exciting than learning something new. And as we start the new chapter of the year, we welcome you with Top January 2022 Industrial IoT & ICS Cybersecurity Events that is happening

A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators, and computers that operate

The Industrial Internet of Things (IIoT) has brought a lot of benefits and disruptive innovations. Despite this, there are 3 main IIoT project risks that prevent companies from adopting IIoT solutions: IIoT security; lack of open standards; integrating legacy M2M/OT equipment with IIoT

‘Tis the holiday season! ‘Tis the events season! December may be the last month of the year, but it’s definitely not the last when it comes to not-to-miss world-shifting events. Below is the list – and timeline – of major events that

The following best practices can help focus strategies to protect against this growing threat: Know Your Risks and Plan Accordingly: There are several ransomware attack strategies that organizations need to prepare. Web-based attacks that target and compromise vulnerable systems are a significant

From a deadly pandemic to the face-to-face Web Summit, November is expected to have its fair share of world-shifting events. Here is a list — and timeline — of the major events that happen in November around the globe & virtual

Operational Technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT (operational technology) cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted collateral damage risks.

A man in the middle attack occurs when a third party intercepts a digital conversation without any knowledge of that interception from the legitimate participants. This conversation can occur between two human users, a human user and a computer system

Thank you for your active participation at ICS Cybersecurity Day. As promised, here are the answers to your questions (those that were not answered live during the event).  Q1.  What solution do you propose for old equipment that have old versions