Voices & Papers

This is a archive for Voices & Papers.

IIoT is Here, but Learn to Secure

By Patrick Grossetete
It’s a fact: Most people are worried about data breaches. While 42 percent of respondents appreciate
Read More.

Reliance Beyond Your System

By Robert Albach
What are the security boundaries of your systems? How much control do you really have? These
Read More.

Managing Risk and Protecting Reputation

By Heather MacKenzie and Mihaela Grad
Over the last ten years there has been a significant shift in the
Read More.

How to Improve a Manufacturer’s Security Posture

By Scot Wlodarczak
It is no secret Industry 4.0 offers great promise for manufacturers to optimize business operations. The
Read More.

Narrowing Down Potential Zero Days

By Robert Landavazo
It seems axiomatic that a Zero Day vulnerability is undefendable. At the moment a particular exploitable
Read More.

IIoT: ‘First, Do No Harm’

By Jalal Bouhdada
Four words have guided the practice of Western medicine over the last two and a half
Read More.

Security, Connectivity: A Tight Balancing Act

By Dan Behrens
Technology advancements such as predictive maintenance, process optimization, and employee safety continue to drive the need
Read More.

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities
Read More.

Russian Cyberattacks on Critical Infrastructure

By Heather MacKenzie and Moreno Carullo
The U.S. government just released an important cybersecurity alert that confirms Russian government
Read More.

A Year in Threats

Last year represented a defining year in ICS security: Two major and unique ICS-disruptive attackers were revealed; five distinct activity
Read More.

 
 
Archived Entries