Cybersecurity for Industrial Control Systems: Part 1
In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. The ever-changing technological landscape has made it possible for…
OT Threats Are on the Rise. Are You Prepared?
For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. But the reality is that most citizens don’t think about these systems until there’s a problem. That’s why the…
What Is a SOC? Top Security Operations Center Challenges
What Is a Security Operations Center (SOC)? A security operations center (SOC) is a critical component of a threat containment plan to protect your business. According to a recent study, having a SOC improves your organization’s…
Top February 2022 Industrial IoT & ICS Cybersecurity Events
Welcome to the second month of 2022! February may be the shortest month of the year but it doesn’t mean we are short on events. This month, we’ve curated the list, with the timeline of major…
How to Protect Deployed Assets from Log4j
What Is the Log4j Exploit Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the CVE-2021-4428 vulnerability in Apache Foundation’s Log4j software is no different. Also known…
Cybersecurity Trends to Prepare for in 2022
Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks? Here are some statistics to showcase what the industry has endured over…
Top January 2022 Industrial IoT & ICS Cybersecurity Events
New year, new beginning, new events! There is nothing more exciting than learning something new. And as we start the new chapter of the year, we welcome you with Top January 2022 Industrial IoT & ICS…
Addressing cybersecurity vulnerabilities in the changing LINUX landscape
Linux is a prevalent component of nearly every workload: more than 90% of cloud workloads and 70% of web servers run on it. Like all technology solutions, Linux has continued to evolve over time, potentially opening you up…
When Industrial Protocol Translation Goes Wrong
A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators,…
Three main risks that prevent companies from adopting IIoT solutions
The Industrial Internet of Things (IIoT) has brought a lot of benefits and disruptive innovations. Despite this, there are 3 main IIoT project risks that prevent companies from adopting IIoT solutions: IIoT security; lack of open…