Cyber Threat Detection: When detecting a threat on your network, every millisecond counts. Any latency in threat detection will give the malware more time to spread or even accept commands from the command and control entity to change to make detection...
The IoT (Internet of Things) is gathering increasing investment and resource allocation attention from enterprises. In the last couple of years, the adoption of IoT has grown significantly. However, despite a sustained discussion around IoT security, little...
According to a recent research published by the IoT Security Foundation, as many as 4 in 5 device manufacturers are not offering a public medium for users to disclose vulnerabilities in their products so that they can be fixed. Despite encouragement from governments...
When it comes to industrial cybersecurity, one of the greatest gaps that exist is between Operational Technology (OT) and Information Technology (IT) cybersecurity. Due to differential evolution and operational goals, IT and OT have traditionally evolved in...
What is the NERC CIP? NERC Critical Infrastructure Protection or simply NERC CIP is a set of compliance requirements designed to secure assets connected to North America’s power infrastructure. The mandates falling under NERC CIIP cover operational assets including...