Control device security

MITRE plans to enhance cybersecurity in 2024 with ICS sub-techniques and multi-domain integration
MITRE plans to enhance cybersecurity in 2024 with ICS sub-techniques and multi-domain integration
New bill introduced to set up Water Risk and Resilience Organization to secure water systems from cyber threats
New bill introduced to set up Water Risk and Resilience Organization to secure water systems from cyber threats
Industrial Cybersecurity Buyers’ Guide 2024 navigates complex industrial landscape
Industrial Cybersecurity Buyers’ Guide 2024 navigates complex industrial landscape
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions
Proposed CIRCIA rule boosts cyber threat understanding, early detection of adversary campaigns, offers coordinated actions

Industrial Cyber Experts

Jonathon Gordon
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Rising cyber threats and attacks against critical infrastructure installations have led to the constant adaptation of the changing... Read full story
Rodrigo Mendes Augusto
Comprehensive Guide to Integrated Operations (Part 2)
Mastering Data Management, Network Security, and OT/IT Integration in Industrial Environments Categories and Classification of Information Flow from... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story