Malware, Phishing & Ransomware

Industrial environments are faced with rising threats from malware directly targeting the sector. Ransomware has escalated from a fledgling threat into a severe force that requires adequate preparation. Adversaries and cybercriminals also use phishing to lure their targets by sending fraudulent emails or other communications. Such messages are designed to look like they come from a trusted sender, with the intent of coaxing their victim to provide confidential information on a scam website. Often, malware gets downloaded onto a computer within the organization, making the impression that cybercrime attacks such as APTs and ransomware incidents usually begin with phishing.

Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Senator Vance issues warning on China-backed Volt Typhoon threat to US critical infrastructure
Senator Vance issues warning on China-backed Volt Typhoon threat to US critical infrastructure
New Claroty report focuses on challenges and priorities of federal OT cyber incidents 
New Claroty report focuses on challenges and priorities of federal OT cyber incidents 
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Two new MITRE programs central to strengthening cyber defense work on building global cyber capacity
MITRE releases EMB3D cybersecurity threat model for embedded devices to boost critical infrastructure security

Industrial Cyber Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Sinclair Koelemij
Creating cohesive OT risk strategy through cybersecurity measures and collaboration with engineering
In today’s rapidly evolving technological landscape, the need to address a comprehensive approach to risk management is crucial... Read full story