Search
Close this search box.

IT/OT

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Operational technology risk assessments and security reviews

Protecting key resources and critical infrastructure (CI), such as healthcare, finance, transportation, telecommunications, energy, and water/wastewater is essential to security, public health and safety, economic vitality and our overall way of life. Recent ransomware attacks, […]

Log4j: Panic or lesson? How to protect deployed assets

Log4j: Panic or lesson? How to protect deployed assets

Nearly every week, the cybersecurity community buzzes around a newly discovered vulnerability or breach. December’s alert for the CVE-2021-4428 vulnerability in Apache Foundation’s Log4j software is no different. Also known as the Log4Shell vulnerability, it is present […]

A lightbulb

What you need to know about the NERC CIP standards

The NERC CIP standards are the mandatory security standards that apply to entities that own or manage facilities that are part of the U.S. and Canadian electric power grid. They were initially approved by the Federal […]

Five steps for OT endpoint security success

Five steps for OT endpoint security success

Operational technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted […]

Image courtesy: CFE Media and Technology

The future of OT cybersecurity’s regulatory era

On July 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) sent a directive to the owner/operators of critical pipelines in the United States clarifying and further defining the initial […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Operational technology risk assessments and security reviews

Protecting key resources and critical infrastructure (CI), such as healthcare, finance, transportation, telecommunications, energy, and water/wastewater is essential to security, public health and safety, economic vitality and our overall way of life. Recent ransomware attacks, […]

Log4j: Panic or lesson? How to protect deployed assets

Log4j: Panic or lesson? How to protect deployed assets

Nearly every week, the cybersecurity community buzzes around a newly discovered vulnerability or breach. December’s alert for the CVE-2021-4428 vulnerability in Apache Foundation’s Log4j software is no different. Also known as the Log4Shell vulnerability, it is present […]

A lightbulb

What you need to know about the NERC CIP standards

The NERC CIP standards are the mandatory security standards that apply to entities that own or manage facilities that are part of the U.S. and Canadian electric power grid. They were initially approved by the Federal […]

Five steps for OT endpoint security success

Five steps for OT endpoint security success

Operational technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted […]

Image courtesy: CFE Media and Technology

The future of OT cybersecurity’s regulatory era

On July 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) sent a directive to the owner/operators of critical pipelines in the United States clarifying and further defining the initial […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES