Security PHA Review Example – Video from Kaspersky Industrial Cybersecurity 2018
Kaspersky has just published the videos from the Kaspersky Industrial CyberSecurity 2018 conference. This video [...]
Kaspersky has just published the videos from the Kaspersky Industrial CyberSecurity 2018 conference. This video [...]
On 20 Sep 2018, Kenexis CEO Ed Marszal presented at the 2018 Kaspersky Industrial Cyber-Security [...]
While reading the Wired article, titled The Untold Story of NotPetya, the Most Devastating Cyberattack [...]
Pipeline Cybersecurity Risks What happens if a hacker takes control remotely of a pump station [...]
Industrial Control Systems or Operational Technology cybersecurity risk calculations are typically based on threat, vulnerability, [...]
Kenexis Open-PHA® integrated software for performing process hazards analysis (PHA) such as HAZOP and [...]
Reducing the Attack Surface with Group Policy You should be constantly working to reduce your [...]
A month ago I was on my way into Istanbul from the Middle East. I [...]
2-factor authentication Most of the people I work with know how I feel about password [...]
Open-PHA™ has been upgraded to include the ability to perform a Security PHA Review [...]
Network appliances like firewalls and switches, have software (commonly referred to as firmware) on them [...]
After reading an ISA article related to the application of Security PHA Review (SPR) [...]
Recently, Jim Gilsinn presented at BSides DC 2016 about cybersecurity work on Industrial Control Systems [...]
This week, someone attempted to penetrate our systems again. Many of these type of attempts are [...]
As a consultant, I travel on a regular basis. When I travel, I usually have [...]
Make sure to check out the cover article in ISA’s InTech publication. In the article, [...]
It is important to note the difference between ‘patching’ and ‘hardening.’ It is also important [...]
It appears the US is going to blame Iran (ink to the New York Times article) [...]
Attached is a presentation on how to analyze hazardous process situations for cybersecurity risks during a [...]
SPRING-BASED CYBERSECURITY for SCADA, PLC, and all other Industrial Control Systems in Process Plants & [...]
I was plowing through email late last evening and I almost clicked on this link. [...]
With the articles that surfaced recently about the post office snapping pictures of faces and license [...]
Industrial Control Network Cost Millions I never considered spending a million dollars directly on an [...]
Kenexis presented the keynote speech at the S4x15 conference last week. During our presentation, we [...]
What constitutes an industrial control system (ICS) or supervisory control and data acquisition (SCADA) system [...]