Critical infrastructure
Critical infrastructure
Securing operational technology: Safeguard infrastructure from cyberattack
How do we guard operational technology against cyberattacks? Tune in as Francis Cianfrocca, Insight Cyber Group CEO, & Chris Sienko dissect this very issue.
Critical infrastructure
Operation technology sees rise in targeted remote access Trojans and ransomware
Operation technology (OT) is one of the most overlooked segments of the IT sector that attack groups target.
Critical infrastructure
Vehicle hacking: A history of connected car vulnerabilities and exploits
New cars have features that need a connection to work, like keyless entry via smartphones or in-car Wi-Fi systems, which can introduce vulnerabilities.
Critical infrastructure
Operational technology compromises: Low sophistication, high-frequency
Operational technology has been a target for bad actors recently, with attacks increasing, though they remain low-level.
Critical infrastructure
ICS/SCADA threats and threat actors
Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems play a critical role in critical infrastructure and industrial
Critical infrastructure
Incident response and recovery best practices for industrial control systems
Introduction In collaboration with the North American Electric Reliability Corporation (NERC), the Federal Energy Regulatory Commission (FERC) developed a
Critical infrastructure
Security Technologies for ICS/SCADA environments
Introduction: Security Challenges Generally speaking, security is not a priority in the context of industrial control systems (ICSs) and Supervisory Control
Critical infrastructure
Data Loss Protection (DLP) for ICS/SCADA
Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on