Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.

The post Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines appeared first on Security Intelligence.

Continue reading Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

Robert M. Lee’s and Jeff Hass’ Little Bobby Comics, ‘It’s Not A Light Switch’

Via the Erudite Security Mindset of Robert M. Lee & the Superlative Illustration Talents of Jeff Hass at Little Bobby Comics.
The post Robert M. Lee’s and Jeff Hass’ Little Bobby Comics, ‘It’s Not A Light Switch’ appe… Continue reading Robert M. Lee’s and Jeff Hass’ Little Bobby Comics, ‘It’s Not A Light Switch’

People Are Recklessly Speculating That the Massachusetts Gas Explosions Were a Stuxnet-Related Hack

There’s no evidence that the Massachusetts gas explosions are caused by hackers, but that hasn’t stopped people from baseless speculations. Continue reading People Are Recklessly Speculating That the Massachusetts Gas Explosions Were a Stuxnet-Related Hack

Air-conditioned apocalypse: A blackout scenario involving smart climate control devices

By David Balaban
Science fiction movies often depict various situations related to cybercriminals’ activity. These can include predicaments where threat actors disrupt the transportation system of a large city or cause power outages in entire regions. … Continue reading Air-conditioned apocalypse: A blackout scenario involving smart climate control devices

Taking the First Steps Down the Security Posture Path with AWWA

What does a human need to survive? Typically, the first two items are food and water followed by a place live. Most of us take for granted that our water supply is always safe and drinkable. As such a vital resource, one would think that the critical i… Continue reading Taking the First Steps Down the Security Posture Path with AWWA