Researchers create OT honeypot, attract exploits and fraud

Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Hardware equipment that ran the factor… Continue reading Researchers create OT honeypot, attract exploits and fraud

A look at cybersecurity for rail systems, building automation and the future of critical infrastructure

Waterfall Security Solutions announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding round to enable aggressive growth. We caught up with Lior Frenkel, CEO and c… Continue reading A look at cybersecurity for rail systems, building automation and the future of critical infrastructure

ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries

MITRE released an ATT&CK knowledge base of the tactics and techniques that cyber adversaries use when attacking ICS that operate some of the nation’s most critical infrastructures including energy transmission and distribution plants, oil refineri… Continue reading ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries

Oil and gas industry risks escalate, cybersecurity should be prioritized

The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected infrastructure, Trend Micro reveals. The latest in-depth report draws on insights … Continue reading Oil and gas industry risks escalate, cybersecurity should be prioritized

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’… Continue reading Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’

Robert M. Lee’s & Jeff Hass’ Little Bobby Comics ‘The Lacking’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Hass at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Hass’ Little Bobby Comics ‘The Lacking… Continue reading Robert M. Lee’s & Jeff Hass’ Little Bobby Comics ‘The Lacking’

How can security teams effectively monitor OT and ICS networks?

Modern industrial operations are complex and dynamic environments that have unique security challenges. Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the issues associated with creating a robust cybersecurity postur… Continue reading How can security teams effectively monitor OT and ICS networks?

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property. Some of the top CyberX report findings noted… Continue reading How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

Robert M. Lee’s & Jeff Hass’ Little Bobby Comics, ‘Old’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Hass at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Hass’ Little B… Continue reading Robert M. Lee’s & Jeff Hass’ Little Bobby Comics, ‘Old’