Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Posts by author

Robert Fairfax

6 posts
Rob Fairfax, financial officer, Cynalytica
  • Hacks & Attacks

Colonial Pipeline attack debrief and lessons

  • Robert Fairfax
  • March 3, 2022
Image courtesy: Brett Sayles
In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s…
Share
Courtesy: Chris Vavra, CFE Media and Technology
Read More
    • IT/OT

    System integrators’ role in the OT cybersecurity crisis

    • Robert Fairfax
    • October 12, 2021
    Whether it’s the shift toward remote work or the growing importance of digital business, trends that have been around for years have only been accelerated by the COVID-19 pandemic. This holds true for the digital…
    Share
    Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
    Read More
      • Threats & Vulnerabilities

      How the American Jobs Plan could improve critical infrastructure cybersecurity

      • Robert Fairfax
      • August 16, 2021
      Some of the key provisions of the American Jobs Plan that support critical infrastructure cybersecurity include: Make $20 billion in energy infrastructure investments for state, local and tribal governments contingent on cyber modernization Create a new tax…
      Share
      Image courtesy: Brett Sayles
      Read More
        • Networks

        Improve legacy critical infrastructure protection

        • Robert Fairfax
        • August 13, 2021
        Distributed network protocol 3.0 (DNP3) is the second most-widely used serial communications protocol in industrial control systems (ICS), after Modbus. As EPRI (Electric Power Research Institute) mentioned in a 2019 technical update: “it is the…
        Share
        Image courtesy: Brett Sayles
        Read More
          • Threats & Vulnerabilities

          Ignoring cyber risk is dangerous to society and your bottom line

          • Robert Fairfax
          • August 13, 2021
          To anyone working in cybersecurity, it is not news that just about every critical infrastructure industry is significantly behind on their path toward cybersecurity maturity. There continues to be a fundamental friction between the estimation…
          Share
          Serial Communications exist primarily at Levels 0 and 1 between logic controllers and legacy field devices –the most critical portions of the control system where physical processes occur. Courtesy: Cynalytica
          Read More
            • IT/OT

            System integrators and serial communication monitoring: Why it matters

            • Robert Fairfax
            • August 8, 2021
            Historically, industrial control systems (ICS) could exist as a closed-loop, with an air-gapped network and a solid physical security program insulating them from the outside world. An operator could trust the integrity of their operations…
            Share
            SUBSCRIBE

            GET ON THE BEAT

            Keep your finger on the pulse of top industry news

            SUBSCRIBE TODAY!
            VULNERABILITY PULSE
            • Berkeley Internet Name Domain (BIND) - May 19, 2022
            • Mitsubishi Electric - May 19, 2022
            • Apache - May 16, 2022
            • CISA - May 16, 2022
            • Joint Cybersecurity Advisory - May 17, 2022

            RECENT NEWS

            • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
            • Will CISA recommend securing industrial control systems?
            • How to implement layered industrial cybersecurity in volatile times
            • Throwback Attack: DDoS attacks are born in the Big Ten
            • Improve two-factor authentication system security

            EDUCATION BEAT

            Introduction to Cybersecurity within Cyber-Physical Systems

            Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

            REGISTER NOW!
            HACKS & ATTACKS
            • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
            • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
            • Minimizing the REvil impact delivered via Kaseya servers
            • Key takeaways from 2020 ICS-CERT vulnerabilities
            Industrial Cybersecurity Pulse

            Copyright 2022 CFE Media and Technology.
            All rights reserved.


            BETA

            Version 1.0

            • Content Partners
            • Contact Us
            • Privacy Policy
            • Terms and Conditions

            Input your search keywords and press Enter.

            By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
            Manage consent

            Privacy Overview

            This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
            Necessary
            Always Enabled
            Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
            Non-necessary
            Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
            SAVE & ACCEPT