The Future of the ICS Security Market Revealed

The Future of the ICS Security Market Revealed

Cue the music for the big reveal (Duhn Duhn Duhnnnnn)!!! As we approach the end of 2018, you will undoubtedly begin to see lots of articles and posts on the year in review, predictions for what the…

IIoT Security:  Obscure, Encrypt and Design Wisely

IIoT Security: Obscure, Encrypt and Design Wisely

With data being the “new oil,” now more than ever it needs securing.  This is especially true when it is coming from the manufacturing floor and as part of the Industrial Internet of Things (IIoT). A single successful cyber…

Released this week: Global ICS & IIoT Risk Report

Released this week: Global ICS & IIoT Risk Report

Industrial and critical infrastructure organizations that rely on industrial control systems (ICS) to run their businesses — such as firms in energy and utilities, oil & gas, pharmaceutical and chemical production, food & beverage, and other…

The CANOPY WING Vulnerability: Weaponizing the Weakness

The CANOPY WING Vulnerability: Weaponizing the Weakness

Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit – is repeated many times every day. Now more than ever companies must be aware of two perspectives: what a system is…