Safeguarding OT from Cyber Threats
A Solid Defense-in-Depth Program with Added Visibility can Help Provide an Early Warning System in Effort to Defend Against Attacks
Read More.


IL Nuke Sees Double with Transformer Woes
At the Clinton Power Station, the Old Adage Lives On: Fool Me Once, Shame on You, Fool Me Twice …
Read More.


NE Nuke: Safety Valves Remained Closed
Nebraska Nuclear Power Plant Operated 89 Days with Key Safety System Impaired EDITOR’S NOTE: This is part of a series
Read More.


Finding the Competitive Edge
Monitoring Applications Gives Visibility, and can Help Hike Performance in a Very Big Way Not too long ago, ExxonMobil came
Read More.


Going Digital
Smarter, Connected Networks Add Complexity, but Plant Floor Can’t be an Island Anymore
A smart, connected enterprise can
Read More.


-
Securing Digital Transformation
By Gregory Hale
An Internet-enabled industrial CCTV system went live online not too long ago and in three short
Read More.
It’s important for those defending critical and industrial infrastructure to share knowledge and stay up-to-date on malware tradecraft. With that in mind, when the GreyEnergy Advanced Persistent Threat (APT) ended up unveiled by ESET last year, I put my reverse engineering skills to work to analyze one of the malware’s infection techniques. This was the phishing email containing a malicious Microsoft Word document (maldoc) that
-
Overcoming the Industrial Cyber Security Skills Gap
- Science Fiction Becomes Reality
- Security Awareness: A Matter of Safety
- Case History: Integrated Safety and Security
- Boosting Plant Uptime
- Process Under Control
- How to Unify IT, Engineering
- In Sync: Process Control, IT
- Honeywell Cyber Security
-
Science Fiction Becomes Reality
There is no doubt security experts were well aware of the potential threat to systems as soon as open systems and interoperability were in full operation a decade or so ago, but that is now also becoming abundantly clear to executives running the business ...
- Security Awareness: A Matter of Safety
- Cyber Security: A Perfect Storm
- Whitelisting Boosts Security
- Whitelisting: Human Factor