Managing risk in today’s IoT landscape: not a one-and-done

Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]

A Cloud Based Alternative to Traditional SCADA

A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]

An overview of the OT/ICS landscape for cyber professionals

An overview of the OT/ICS landscape for cyber professionals infosec, cybersecurity, IIoT, ICSaaS, scada, cloudscada

Organizations are advancing their efforts, investing in OT cybersecurity programs -ICS cybersecurity postures are maturing – OT/IT convergence is the norm

Organizations are advancing their efforts, investing in OT cybersecurity programs –ICS cybersecurity postures are maturing – OT/IT convergence is the […]

Extending Cybersecurity to Protect OT And Industrial IoT Devices and Networks

Extending Cybersecurity to Protect OT And Industrial IoT Devices and Networks https://www.forbes.com/sites/tonybradley/2020/02/11/extending-cybersecurity-to-protect-ot-and-industrial-iot-devices-and-networks/ infosec, cybersecurity, IIoT, ICSaaS, scada, cloudscada

Cyber Threat Intelligence Uses, Successes and Failures: The SANS 2017 CTI Survey

  Cyber Threat Intelligence Uses, Successes and Failures: The SANS 2017 CTI Survey   Cyber threat intelligence (CTI) shows promise […]

Threat Intelligence Market worth 8.94 Billion USD by 2022 – Growing at a CAGR of 18.4% During 2017 to 2022

  Global $8.94 Bn Threat Intelligence Market Insights, Opportunity Analysis, Market Shares and Forecasts, 2017 – 2023 – ResearchAndMarkets.com The […]

Threat intelligence needs to grow up: Security teams are overwhelmed with a massive amount of threat data

  Aggregating that data requires a shift in mindset and a maturing of threat intelligence in order to better mitigate […]

Industrial Firms Slow to Adopt Cybersecurity Measures: Honeywell

…Industrial companies are slow to adopt cyber security capabilities and technology to protect their data and operations, according to a […]

Kroll Annual Global Fraud Risk Report: Businesses Report All-Time High Levels of Fraud, Cyber, and Security Incidents During 2017

  Kroll Annual Global Fraud & Risk Report 84% of companies surveyed worldwide experienced a fraud incident in 2017, 86% […]

MITRE: What’s Next for ATT&CK – Cyber Threat Intelligence

  ATT&CK is a MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge […]

MITRE: ATT&CK -Based Product Evaluations – Threat-based Defense

  ATT&CK is a MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of adversaries’ operations […]

World Economic Forum: The Global Risks Report 2018

  The Global Risks Report 2018: This year’s report covers more risks than ever, but focuses in particular on four key […]

MGS+ Threat Intelligence as a Critical Organizational Need – MGS+ Report

  The critical need for an evidence based, automated, holistic approach of the threat landscape.   These are challenging times […]

MGS+ ICS Security Report September 2017

MG Strategy+ ICS Security Report September 2017: Editor Picks: News Intelligence Alerts Reports   WannaCry Post Mortem: Early Warning Indicators and […]

ICS Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts

  Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]

MGS+ ICS Security Report August 2017

MG Strategy+ ICS Security Report August 2017: Editor Picks: News Intelligence Alerts Reports   Financial malware more than twice as prevalent […]

Center for Internet Security MS-ISAC Alert Level

Center for Internet Security MS-ISAC Alert Level

Digital Attack Map Top Daily DDoS attacks worldwide

Arbor Networks Digital Attack Map Top Daily DDoS attacks worldwide

Cybermap Kaspersky

Kaspersky Cybermap

MGS+ ICS Security Report July 2017

MG Strategy+ ICS Security Report July 2017: Editor Picks: News Intelligence Alerts Reports   Power plant cyber threat: Lock up your […]

MGS+ ICS Security Report June 2017

MGS+ ICS Security Report June 2017: Editor Picks: News Intelligence Alerts Report   Why Future Emphasis Should be on Algorithms – […]

Information Overload – Finding Signals in the Noise

  Information overload: Finding Signals in the Noise: Sometimes it’s possible to have too much threat data… IT / InfoSec […]

MGS+ ICS Security Report May 2017

MGS+ ICS Security Report May 2017: Editor Picks: News Intelligence Alerts Report   ABB buys B&R to help it challenge Siemens […]

MGS+ ICS Security Report April 2017

MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report   2017 Security 100: 20 Coolest Endpoint Security Vendors […]

MGS+ ICS Security Report March 2017

MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports   World’s Biggest Data Breaches Selected losses greater than […]