Industrial network security best practice advice
Industrial network security best practice advice -Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Managing risk in today’s IoT landscape: not a one-and-done
Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]
A Cloud Based Alternative to Traditional SCADA
A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]
An overview of the OT/ICS landscape for cyber professionals
An overview of the OT/ICS landscape for cyber professionals infosec, cybersecurity, IIoT, ICSaaS, scada, cloudscada
Organizations are advancing their efforts, investing in OT cybersecurity programs -ICS cybersecurity postures are maturing – OT/IT convergence is the norm
Organizations are advancing their efforts, investing in OT cybersecurity programs –ICS cybersecurity postures are maturing – OT/IT convergence is the […]
Extending Cybersecurity to Protect OT And Industrial IoT Devices and Networks
Extending Cybersecurity to Protect OT And Industrial IoT Devices and Networks https://www.forbes.com/sites/tonybradley/2020/02/11/extending-cybersecurity-to-protect-ot-and-industrial-iot-devices-and-networks/ infosec, cybersecurity, IIoT, ICSaaS, scada, cloudscada
Cyber Threat Intelligence Uses, Successes and Failures: The SANS 2017 CTI Survey
Cyber Threat Intelligence Uses, Successes and Failures: The SANS 2017 CTI Survey Cyber threat intelligence (CTI) shows promise […]
Threat Intelligence Market worth 8.94 Billion USD by 2022 – Growing at a CAGR of 18.4% During 2017 to 2022
Global $8.94 Bn Threat Intelligence Market Insights, Opportunity Analysis, Market Shares and Forecasts, 2017 – 2023 – ResearchAndMarkets.com The […]
Threat intelligence needs to grow up: Security teams are overwhelmed with a massive amount of threat data
Aggregating that data requires a shift in mindset and a maturing of threat intelligence in order to better mitigate […]
Industrial Firms Slow to Adopt Cybersecurity Measures: Honeywell
…Industrial companies are slow to adopt cyber security capabilities and technology to protect their data and operations, according to a […]
Kroll Annual Global Fraud Risk Report: Businesses Report All-Time High Levels of Fraud, Cyber, and Security Incidents During 2017
Kroll Annual Global Fraud & Risk Report 84% of companies surveyed worldwide experienced a fraud incident in 2017, 86% […]
MITRE: What’s Next for ATT&CK – Cyber Threat Intelligence
ATT&CK is a MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge […]
MITRE: ATT&CK -Based Product Evaluations – Threat-based Defense
ATT&CK is a MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of adversaries’ operations […]
World Economic Forum: The Global Risks Report 2018
The Global Risks Report 2018: This year’s report covers more risks than ever, but focuses in particular on four key […]
MGS+ Threat Intelligence as a Critical Organizational Need – MGS+ Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
MGS+ ICS Security Report September 2017
MG Strategy+ ICS Security Report September 2017: Editor Picks: News Intelligence Alerts Reports WannaCry Post Mortem: Early Warning Indicators and […]
ICS Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]
MGS+ ICS Security Report August 2017
MG Strategy+ ICS Security Report August 2017: Editor Picks: News Intelligence Alerts Reports Financial malware more than twice as prevalent […]
Center for Internet Security MS-ISAC Alert Level
Center for Internet Security MS-ISAC Alert Level
Digital Attack Map Top Daily DDoS attacks worldwide
Arbor Networks Digital Attack Map Top Daily DDoS attacks worldwide
Cybermap Kaspersky
Kaspersky Cybermap
MGS+ ICS Security Report July 2017
MG Strategy+ ICS Security Report July 2017: Editor Picks: News Intelligence Alerts Reports Power plant cyber threat: Lock up your […]
MGS+ ICS Security Report June 2017
MGS+ ICS Security Report June 2017: Editor Picks: News Intelligence Alerts Report Why Future Emphasis Should be on Algorithms – […]
Information Overload – Finding Signals in the Noise
Information overload: Finding Signals in the Noise: Sometimes it’s possible to have too much threat data… IT / InfoSec […]
MGS+ ICS Security Report May 2017
MGS+ ICS Security Report May 2017: Editor Picks: News Intelligence Alerts Report ABB buys B&R to help it challenge Siemens […]
MGS+ ICS Security Report April 2017
MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report 2017 Security 100: 20 Coolest Endpoint Security Vendors […]
MGS+ ICS Security Report March 2017
MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports World’s Biggest Data Breaches Selected losses greater than […]