What are the dynamics facing today’s OT engineers, whether they’re new to the industry or bringing years of experience?
Federated learning is a collaborative method for training a machine-learning model that keeps sensitive user data private.
Protecting automation systems from cyberattacks — particularly those in critical infrastructure — has been an imperative for almost 20 years.
Advanced persistent threats (APTs), such as Holmium, can stay hidden for years without discovery, all while collecting private information from companies.
David Masson, Sam May and Bryan Bennett discuss the importance of having a business continuity plan in the event of a cyberattack.
As industrial devices become more connected, cyber risk is exploding. We’re proud to announce the new, weekly ICS Pulse Podcast.
IIoT connects the edge devices in OT networks directly to the Internet to enhance operational efficiencies.
ICS/OT infrastructure security is different in many ways from IT security, and one of the main reasons is the reverse confidentiality triad.
ColdLock ransomware hits several key critical infrastructure assets in Taiwan, including state-run petrochemical company CPC.
Given the interconnectedness of global manufacturing, companies are only as strong as the weakest link in their supply chain.