Malicious hackers are threatening public safety all over the world. Cyberattacks could cut off the supply of electricity to hospitals, homes, schools and factories. A loss of electricity would also have heavy implications for other vital services.
To learn why secure-by-design power system are essential to cyber resiliency, read on.
Leading a successful cyber security solution PoC takes a laser-like focus on project management (aka scoping, scheduling and herding cats), along with softer skills like relationship building, negotiation and patience.
I’ve often been asked about the most important considerations in planning for an ICS Proof of Concept. From use cases to subjective metrics to scope creep, read on to learn what I think matters the most.
Thanks to TRITON, the Oil and Gas industry became ground zero for the convergence of SIS process safety and ICS cybersecurity.
Read on to learn why a unified approach to monitoring control system and process safety assets is now mission critical, and what steps you can take to strengthen security.
When the GreyEnergy Advanced Persistent Threat (APT) was unveiled last year, I decided to put my reverse engineering skills to work and study one of its infection techniques.
Find out about the methods the malware’s packer stage used to conceal its true functionality, plus get access to my full Research Paper, in today’s article.
January 14 – 17, 2019, Miami South Beach, FL, United States