Attacks and Vulnerabilities

EclecticIQ details Operation FlightNight targeting Indian government entities, energy sector
EclecticIQ details Operation FlightNight targeting Indian government entities, energy sector
CS4CA USA Summit 2024 panel explores holistic approach to risk management, risk reduction strategies
CS4CA USA Summit 2024 panel explores holistic approach to risk management, risk reduction strategies
CS4CA USA Summit 2024: IT and OT security leaders share insights on cyberattack mitigation and recovery strategies
CS4CA USA Summit 2024: IT and OT security leaders share insights on cyberattack mitigation and recovery strategies
FDD study reveals gaps in US military's cyber talent recruitment and retention, calls for reforms
FDD study reveals gaps in US military’s cyber talent recruitment and retention, calls for reforms
Claroty's Team82 reveals critical vulnerabilities in Unitronics UniStream devices, prompting vendor updates
Claroty’s Team82 reveals critical vulnerabilities in Unitronics UniStream devices, prompting vendor updates

Industrial Cyber Experts

Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Jonathon Gordon
Rising significance of OT asset visibility in cybersecurity resilience across critical infrastructure
Critical infrastructure organizations face an increasing cybersecurity threat and attack landscape. To address this, they need to establish... Read full story