Addressing cybersecurity vulnerabilities in the changing LINUX landscape
· Cybersecurity

Addressing cybersecurity vulnerabilities in the changing LINUX landscape

Linux is a prevalent component of nearly every workload: more than 90% of cloud workloads and 70% of web servers run on it. Like all technology solutions, Linux has continued to evolve over time, potentially opening you up to new cyber security threats. Bad actors often have an advantage because they are working against known security measures […]

Read more →
When Industrial Protocol Translation Goes Wrong
· Cybersecurity

When Industrial Protocol Translation Goes Wrong

A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators, and computers that operate smart factories, dams, power plants, and other industrial facilities. If protocol gateways fail, then the […]

Read more →
3 Benefits of a 360-Degree Vulnerability Assessment
· Connected Industry

3 Benefits of a 360-Degree Vulnerability Assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities Vulnerability management teams often face difficulties in patching all of their systems on a timely basis. This is true for traditional OT devices such as HMIs, PLCs, etc. But it is also very true in sensitive IT-like environments such as pharmaceutical labs or […]

Read more →
Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software
· Cybersecurity

Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software

Current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. Recent research by RunSafe Security partners show that current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. When measured against NIST CVEs (Common Vulnerability Enumerations from the National Vulnerability Database), […]

Read more →