When it comes to zero-day threats, we’re all just sitting ducks. Or are we? 0
When it comes to zero-day threats, we’re all just sitting ducks. Or are we?

It seems axiomatic that a zero-day vulnerability is undefendable. At the moment a particular exploitable bit of software code is discovered by a malicious hacker and the clock starts ticking from zero-day forward, clearly, by definition, there is no protective patch or workaround yet available. And so the hacker has free rein to wreak havoc while the good guys work frantically to play catch up.

read more »
How Plant Operators Can Overcome the Language Barrier to Securing OT Environments 0
How Plant Operators Can Overcome the Language Barrier to Securing OT Environments

Securing industrial operations is a unique challenge. The same approach used to secure information technology (IT) networks can’t effectively secure plant floors. That’s because operational technology (OT) has evolved tremendously over the years, creating very complex environments consisting of a dizzying variety of devices from different makes, models and generations communicating through different protocols.

read more »
The Human Attack Surface: The Weakest Link in Your ICS Security 0
The Human Attack Surface: The Weakest Link in Your ICS Security

Like many specialized disciplines, the world of cyber security is filled with technical jargon that can hamper communication. In this blog, we’ll demystify some cyber security best practices and terms, as we focus on an often-overlooked factor in ICS and corporate security known as the “attack surface.” We’ll take an in-depth look at what attack surfaces are, how to keep them safe and how the human element plays a critical role in their security.

read more »
Three Ways to Improve Your IP Network Security 0
Three Ways to Improve Your IP Network Security

Improving upon your IP network security is vitally important, especially considering that many of today's industrial networks use Ethernet alongside legacy protocols that were designed long before security was a main goal, such as with TCP/IP protocols. However, this doesn't mean that improving your network security needs to be complicated.

read more »
Evaluating Deep Packet Inspection Technology: Six Essential Elements 0
Evaluating Deep Packet Inspection Technology: Six Essential Elements

Did you know that it’s National Cyber security Awareness Month? During the month of October, everyone is encouraged to raise awareness about the vital role cyber security plays in the lives of U.S. citizens. In honor of National Cyber security Awareness Month, I’ve decided to revisit a topic that I’ve blogged on before, because of the important role it plays in the advancement of network security for industrial control systems. The topic: Deep Packet Inspection (DPI).

read more »
up
Shop is in view mode
View full version of the site
Sklep internetowy Shoper.pl