5 Things to Consider for Your ICS Security Proof of Concept

5 Things to Consider for Your ICS Security Proof of Concept

Leading a successful cyber security solution PoC takes a laser-like focus on project management (aka scoping, scheduling and herding cats), along with softer skills like relationship building, negotiation and patience.
I’ve often been asked about the most important considerations in planning for an ICS Proof of Concept. From use cases to subjective metrics to scope creep, read on to learn what I think matters the most.

GreyEnergy Malware Research Paper: Maldoc to Backdoor

GreyEnergy Malware Research Paper: Maldoc to Backdoor

When the GreyEnergy Advanced Persistent Threat (APT) was unveiled last year, I decided to put my reverse engineering skills to work and study one of its infection techniques.

Find out about the methods the malware’s packer stage used to conceal its true functionality, plus get access to my full Research Paper, in today’s article.