Search
Close this search box.

Facilities

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

Six steps for cyberattack incident response planning

How a company responds to an incident is important. The wrong response could damage the company’s reputation or destroy it altogether. A proactive and timely response to an incident can result in great press and […]

Image courtesy: CFE Media and Technology

Lessons learned from the Colonial Pipeline attack

Over the weekend, Colonial Pipeline, owner of 5,500 miles of pipeline carrying natural gas, gasoline, and diesel from Texas to New Jersey, shut down its operations in response to what it said was a ransomware […]

Courtesy: Industrial Defender

Overcome patch, management vulnerabilities in an OT environment

A vulnerability is a weakness in a computing resource that can be exploited to cause harm. Mitigating vulnerability risk is accomplished through an effective vulnerability management program that includes vulnerability monitoring, vulnerability risk assessment, and vulnerability mitigation […]

Throwback Attack: Lessons from the Aurora vulnerability

Throwback Attack: Lessons from the Aurora vulnerability

Lessons can be learned from prior cybersecurity efforts, even older ones, as this 2007 demonstration showed. Are you aware of the eight ways to mitigate the Aurora vulnerability? In 2007, the Department of Homeland Security, […]

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

Six steps for cyberattack incident response planning

How a company responds to an incident is important. The wrong response could damage the company’s reputation or destroy it altogether. A proactive and timely response to an incident can result in great press and […]

Image courtesy: CFE Media and Technology

Lessons learned from the Colonial Pipeline attack

Over the weekend, Colonial Pipeline, owner of 5,500 miles of pipeline carrying natural gas, gasoline, and diesel from Texas to New Jersey, shut down its operations in response to what it said was a ransomware […]

Courtesy: Industrial Defender

Overcome patch, management vulnerabilities in an OT environment

A vulnerability is a weakness in a computing resource that can be exploited to cause harm. Mitigating vulnerability risk is accomplished through an effective vulnerability management program that includes vulnerability monitoring, vulnerability risk assessment, and vulnerability mitigation […]

Throwback Attack: Lessons from the Aurora vulnerability

Throwback Attack: Lessons from the Aurora vulnerability

Lessons can be learned from prior cybersecurity efforts, even older ones, as this 2007 demonstration showed. Are you aware of the eight ways to mitigate the Aurora vulnerability? In 2007, the Department of Homeland Security, […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES