When it comes to zero-day threats, we’re all just sitting ducks. Or are we? 0
When it comes to zero-day threats, we’re all just sitting ducks. Or are we?

It seems axiomatic that a zero-day vulnerability is undefendable. At the moment a particular exploitable bit of software code is discovered by a malicious hacker and the clock starts ticking from zero-day forward, clearly, by definition, there is no protective patch or workaround yet available. And so the hacker has free rein to wreak havoc while the good guys work frantically to play catch up.

read more »
New NFPA 79 2018 Standard Dictates New Design Requirements for VFD Applications 0
New NFPA 79 2018 Standard Dictates New Design Requirements for VFD Applications

As industry readers well know, the National Fire Protection Association (NFPA) is an authority of critical importance for any organization operating or manufacturing electrical equipment and related accessories. The creator and maintainer of the ubiquitous National Electric Code (also known as NFPA 70), originally founded in 1896, is devoted to eliminating “death, injury, property and economic loss due to fire, electrical and related hazards.” The NFPA currently maintains some 300 standards, which often form defacto regulations in their product categories for states and municipalities in the United States, and, in many cases, adopted as such in localities around the world.

read more »
How Plant Operators Can Overcome the Language Barrier to Securing OT Environments 0
How Plant Operators Can Overcome the Language Barrier to Securing OT Environments

Securing industrial operations is a unique challenge. The same approach used to secure information technology (IT) networks can’t effectively secure plant floors. That’s because operational technology (OT) has evolved tremendously over the years, creating very complex environments consisting of a dizzying variety of devices from different makes, models and generations communicating through different protocols.

read more »
The Human Attack Surface: The Weakest Link in Your ICS Security 0
The Human Attack Surface: The Weakest Link in Your ICS Security

Like many specialized disciplines, the world of cyber security is filled with technical jargon that can hamper communication. In this blog, we’ll demystify some cyber security best practices and terms, as we focus on an often-overlooked factor in ICS and corporate security known as the “attack surface.” We’ll take an in-depth look at what attack surfaces are, how to keep them safe and how the human element plays a critical role in their security.

read more »
up
Shop is in view mode
View full version of the site
Sklep internetowy Shoper.pl