Harvest now, decrypt later: Encrypted data is under hackers’ radar
Cyber criminals are intensifying what are known as “harvest now, decrypt later” attacks to get encrypted data and decrypt them later.
NIST releases version 2.0 of landmark cybersecurity framework
NIST releases version 2.0 of its cybersecurity framework, the first major update since its creation in 2014.
Defending Against AI-assisted Attacks: Ethan Schmertzler, Dispel, ICS Pulse Podcast
The ICSP podcast recently sat down with Ethan Schmertzler of Dispel to talk about AI-assisted attacks and moving target defense.
Navigating the seas of maritime cyber risk: prepare for new regulations
The IMO defines maritime cyber risk as the potential threat to technology assets that could lead to security failures.
Top 3 predictions for ICS and OT security in 2024
The expectation is to see more ransomware targeting ICS/OT environments, whether unintentionally or intentionally.
Cybersecurity challenges in manufacturing: Leah Dodson, Nextlink Labs, ICS Pulse Podcast
A big part safeguarding critical infrastructure from cyber threats revolves around cyber insurance and the cost to protect systems.
Enhance efficiency and boost productivity by integrating cybersecurity and operations
Industrial companies face a delicate balancing act between driving operational efficiency and defending against cyberattacks.
Prepare For What’s Coming with the 2023 OT Cybersecurity Year in Review
The Dragos 2023 OT Cybersecurity Year in Review has lessons and strategies, guiding you to a more secure industrial future.
Communication in cybersecurity: Leah Dodson, Nextlink Labs, ICS Pulse Podcast
Recently, the ICS Pulse talked to Leah Dodson of Nextlink Labs about the importance of communication in cybersecurity.
Zscaler finds most cyberattacks hide in encrypted traffic; manufacturing is the most targeted industry
Zscaler finds 86% of cyberattacks are delivered over encrypted channels, with manufacturing as the most targeted industry.