CONTROL NEWS YOU CAN USE SINCE 2006

Search
Close this search box.

Category: Cyber Security

Practical Application for Using Shodan

Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or

Shodan – Are Your Sites Listed?

If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it.  Shodan has been called the “Google”

Real-Time Threat Maps

If you haven’t seen these maps, it can be eye opening.  These are real-time and/or near real-time threat maps that are readily available online.   

Are You Patching The Humans In Your Control System?

Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes

Cyber Security Terms and Definitions – Part 2

The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will

Cyber Security Terms and Definition – Part 1

Just like in the controls industry, cybersecurity has its share of acronyms, terms, etc. Wading through these can be overwhelming. The list below is some

Stay In The Know. Join The Control Trends Newsletter.