IT Security

September 10, 2018

Securing Operational Technology Networks with Skybox Security

Operational technology (OT) networks and critical infrastructure encompassing industrial control and supervisory control and data acquisition (ICS and SCADA) systems are becoming more prevalent attack vectors […]
September 10, 2018

Why a Unified Approach to IT and OT Network Security is Critical

Operational technology (OT) encompasses hardware and software that monitors and manages physical equipment and processes. It includes a variety of industrial control systems (ICS) such as […]
September 4, 2018

Defining Control Security

How useful is this definition and understanding of cybersecurity in the world of industrial control systems? At Waterfall Security we see that our customers care enormously […]
September 13, 2017

Encryption Crackdown

While losing the encrypted messages features from messaging formats like WhatsApp will not usually affect end users at all, and the discussion is heavily on terrorism […]
August 17, 2017

Template Injection Attacks

Widely used by web applications, template engines allow the presentation of dynamic data in web pages and emails. Critical vulnerabilities frequently are found where user input […]
August 1, 2017

Operational Technology and Industry

Most people are familiar with the term Information Technology, or IT, and the way it refers to the use of computers in the storage, manipulation, transmission […]
June 27, 2017

Is your business safe from cyber-attacks?

As technology advances at an incredible pace and industries transform, Powel encounters challenges as well as opportunities for innovation. An extremely important part of this transformation […]
June 9, 2017

Kaspersky State of Industrial Cyber Security 2017 – Info Graphic & Report

The need to secure industrial control systems (ICS) from the risk of cyber-attacks cannot be underestimated in a world where human error, online criminal activity and […]
May 27, 2017

ICS Cyber Security – Is DUQU 2.0 An example of Artificial Intelligence (AI) Influenced Malware? By Mike Loginov

In this weeks Security@IOTSA Blog we focus on an emerging potential cyber security threat to the energy sector and indeed critical infrastructure at a local, national […]