Voices & Papers

This is a archive for Voices & Papers.

Reverse Engineering GreyEnergy Malware

By Alessandro Di Pinto
It’s important for those defending critical and industrial infrastructure to share knowledge and stay up-to-date
Read More.

Metrics for an Effective Cybersecurity Program

By Eric Cosman
Previous discussions have looked at how to define and implement cybersecurity programs based on guidance and
Read More.

SOC Central: Combining IT, OT

By Heather MacKenzie
With the responsibility to keep their companies ahead of all enterprise-wide threats, CIOs or CISOs certainly
Read More.

Video Safeguard’s Manufacturing Facilities

By Jumbi Edulbehram
One of the biggest challenges for companies that operate industrial facilities — factories, manufacturers, warehouses, loading
Read More.

Intent-Based Industrial Networks

By Dave Cronberger
Manufacturing networks today are massive and pass quite a bit of unutilized data. These networks also
Read More.

NC City Tightens Water Security

By Joe Scotto
The City of Raleigh needed an industrial security solution that could detect attacks, identify threats and
Read More.

Pipeline Visibility Cuts Downtime

By Paul Smith
Operators in the midstream oil and gas industry know their main priorities are to keep product
Read More.

Turn Fear into an Advantage

By Eric Ehlers
It is the season for scary Halloween movies, and the most terrifying ones are often about
Read More.

Data Breach Response, Prevention

By John Grim
Cyber-espionage is a primary motivation behind data breaches in the manufacturing industry. Manufacturers have a lot
Read More.

Security, Yes, Cameras Provide Other Value

By Neeraj Periwal
Security cameras have long been used in many different business settings to protect against theft and
Read More.

Archived Entries