Critical infrastructure

Securing operational technology: Safeguard infrastructure from cyberattack

How do we guard operational technology against cyberattacks? Tune in as Francis Cianfrocca, Insight Cyber Group CEO, & Chris Sienko dissect this very issue.

Operation technology sees rise in targeted remote access Trojans and ransomware

Operation technology (OT) is one of the most overlooked segments of the IT sector that attack groups target.

Vehicle hacking: A history of connected car vulnerabilities and exploits

New cars have features that need a connection to work, like keyless entry via smartphones or in-car Wi-Fi systems, which can introduce vulnerabilities.

Operational technology compromises: Low sophistication, high-frequency

Operational technology has been a target for bad actors recently, with attacks increasing, though they remain low-level.

ICS/SCADA threats and threat actors

Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems play a critical role in critical infrastructure and industrial

Incident response and recovery best practices for industrial control systems

Introduction  In collaboration with the North American Electric Reliability Corporation (NERC), the Federal Energy Regulatory Commission (FERC) developed a

Security in a Blue Data Background Illustration


Introduction Cybersecurity in the process industries is a growing concern due to the increasing number of cyber attacks against industrial control systems (I

Security in a Blue Data Background Illustration

Security Technologies for ICS/SCADA environments

Introduction: Security Challenges Generally speaking, security is not a priority in the context of industrial control systems (ICSs) and Supervisory Control

Security in a Blue Data Background Illustration

Data Loss Protection (DLP) for ICS/SCADA

Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on

Security in a Blue Data Background Illustration

ICS/SCADA Wireless Attacks

Introduction Wireless communication has gained attention in the industrial environment. Many organizations have moved from wired networks to wireless in orde