CONTROL NEWS YOU CAN USE SINCE 2006

Search
Close this search box.

Author: Fred Gordy

If You’re Breached, You May Be Facing Two Battles

According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that

Practical Application for Using Shodan

Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or

Top US Cities With Exposed Niagara Systems

And Other Scary Stats (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor.  The intent is

Shodan – Are Your Sites Listed?

If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it.  Shodan has been called the “Google”

Real-Time Threat Maps

If you haven’t seen these maps, it can be eye opening.  These are real-time and/or near real-time threat maps that are readily available online.   

Are You Patching The Humans In Your Control System?

Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes

Cyber Security Terms and Definitions – Part 2

The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will

Cyber Security Terms and Definition – Part 1

Just like in the controls industry, cybersecurity has its share of acronyms, terms, etc. Wading through these can be overwhelming. The list below is some

Stay In The Know. Join The Control Trends Newsletter.