Cybersecurity for the Manufacturing Sector: Reduce Data Integrity Breaches with NIST SP 1800–10Attacks against OT/ICS continue to increase as these networks become more publicly accessible. Many of these systems continue to be…Sep 27, 2022Sep 27, 2022
Triton Ransomware Attack Targets Industrial ProcessesCyberattacks against operational technology in critical infrastructure facilities and chemistry research institutes have grown…Sep 17, 2022Sep 17, 2022
“Proof of Compromise” from Ransomware Attacks on Critical National Infrastructure(CNI)Operational Technology(OT) cybersecurity has become a hot topic in plant facilities also known as OT, Industrial Automation and Control…Sep 9, 2022Sep 9, 2022
The First Step in Operational Technology(OT) CybersecurityLegacy security controls, tools, and practices cannot address OT and IoT devices’ vulnerabilities. Visibility is a fundamental…Sep 6, 2022Sep 6, 2022
Defending Against Conti Ransomware: Zero Trust SegmentationRecent cyber-attacks against Ukraine’s infrastructure, including evidence of destructive malware like WhisperGate and HermeticWiper, and…May 20, 2022May 20, 2022
Reinventing Security for Corporate Networks with Universal ZTNAZero Trust is a security model developed by former Forrester analyst John Kindervag in 2010. Since then, the “zero trust” model has become…May 18, 2022May 18, 2022
BlackCat Ransomware-as-a-Service and VMware ESXi…AgainFBI warns of BlackCat ransomware that breached Over 60 Organisations WorldwideMay 1, 2022May 1, 2022
Secure Access into Backup and Recovery ConsolesRecognizing the threat to data backup and restore systemsApr 15, 2022Apr 15, 2022