Top December 2021 Industrial IoT & ICS Cybersecurity Events
‘Tis the holiday season! ‘Tis the events season! December may be the last month of the year, but it’s definitely not the last when it comes to not-to-miss world-shifting events. Below is the list – and…
Protect Your Organization Against Ransomware Attacks
The following best practices can help focus strategies to protect against this growing threat: Know Your Risks and Plan Accordingly: There are several ransomware attack strategies that organizations need to prepare. Web-based attacks that target and compromise…
Top November 2021 Industrial IoT & ICS Cybersecurity Events
From a deadly pandemic to the face-to-face Web Summit, November is expected to have its fair share of world-shifting events. Here is a list — and timeline — of the major events that happen in November…
5 steps for successful OT endpoint cybersecurity risk management
Operational Technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT (operational technology) cyber risks has never been greater. New threats are emerging every day – both targeted as well as…
Everything you need to know about a Man in the Middle Attack
A man in the middle attack occurs when a third party intercepts a digital conversation without any knowledge of that interception from the legitimate participants. This conversation can occur between two human users, a human user…
ICS Cybersecurity Day 2021 – Answers to your questions from Quantalytics and Trend Micro
Thank you for your active participation at ICS Cybersecurity Day. As promised, here are the answers to your questions (those that were not answered live during the event). Q1. What solution do you propose for old…
3 Steps to Reduce Risk and Respond to Threats in Industrial Environments
Industrial cyber security leaders – including the C-suite, CISOs, security teams, and operational leaders – are increasingly realizing the potential financial, operational and safety impact of cyber events. Attempting to get their hands around securing this…
Five Guiding Principles for Industrial IoT Security
The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspec- tive of new business models and process transformation, IoT applications are perhaps even greater than…
Top five largest cyber-attacks in the past year and lessons learnt
Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how they’re doing business. Large cyber-attacks on enterprises’ software, in particular, have already affected millions of users.…
AI vs. AI: The Future of Cybersecurity
Artificial Intelligence, or AI, isn’t actually a new concept. In fact, it’s been around since the 1950s. The problem back then was that computers lacked the ability to store commands, so they could be told what…