If You’re Breached, You May Be Facing Two Battles
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that
Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or
My friend and mentor Billy Rios will be the instructor for the upcoming SANS Institute ICS/SCADA Security Essentials in Atlanta, September 28 thru October
Shodan Cataloging of Liebert & APC (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The
And Other Scary Stats (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The intent is
If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it. Shodan has been called the “Google”
If you haven’t seen these maps, it can be eye opening. These are real-time and/or near real-time threat maps that are readily available online.
Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes
The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will
Just like in the controls industry, cybersecurity has its share of acronyms, terms, etc. Wading through these can be overwhelming. The list below is some