SOOS creates public SBOM database for 54M open-source packages

SOOS announced the launch of its public SBOM database, where anyone can download an SPDX or CycloneDX SBOM for over 54 million packages.
Six steps to minimize supply chain risk in manufacturing

By identifying vulnerable suppliers and mitigating supply chain risk, a company can take proactive steps to protect their cybersecurity.
Throwback Attack: AW North Carolina attack shows dangers of ransomware and just-in-time manufacturing

The AW North Carolina cyberattack was an excellent example of why just-in-time manufacturing and ransomware can be a toxic mix.
Five cybersecurity predictions for 2023

Five key predictions, pulled from a range of cybersecurity analysts and experts, that are expected to emerge as 2023 progresses.
The big miss in the National Cybersecurity Strategy

The National Cybersecurity Strategy has no approaches for how critical infrastructure will continue to function after a cyber incident.
Throwback Attack: Ukrainian railway hit by cyberattack, stranding passengers

A Ukrainian railway cyberattack hit the nation’s vital transport system, underscoring the urgent need for enhanced cybersecurity measures.
How zero trust can help secure complex OT: Expert Interview Series, Ritesh Agrawal, Airgap Networks

Ritesh Agrawal of Airgap Networks talks about protecting critical infrastructure and the value of zero trust in complex OT networks.
Taking IT/OT convergence from theory into practice

Organizational challenges need to be addressed to achieve IT/OT convergence, from political and cultural barriers to technical complexities.
The cybersecurity skills gap: ICS Pulse Podcast, Sam May, Steel Root

Sam May of Steel Root talked to the ICS Pulse Podcast about the cybersecurity skills gap and how to combat it.
Throwback Attack: Korea Hydro and Nuclear Power highlights the vulnerability of critical systems

In 2014, Korea Hydro and Nuclear Power in South Korea suffered a cybersecurity incident that was blamed on their neighbors to the north.