Search
Close this search box.

Education

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

Online Course: How to engineer a secure industrial control network

Online Course: How to engineer a secure industrial control network

In this session, the presenter will outline the current threat landscape, identify some of the most common vulnerabilities and outline some practical first steps to take to secure industrial control systems, as well as how to take a more holistic view of ICS security

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

Online Course: How to engineer a secure industrial control network

Online Course: How to engineer a secure industrial control network

In this session, the presenter will outline the current threat landscape, identify some of the most common vulnerabilities and outline some practical first steps to take to secure industrial control systems, as well as how to take a more holistic view of ICS security

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES