Webinar: Prioritizing Risk Mitigations for Renewable Energy Assets
This learning session will teach you how to perform an accurate cost/benefit analysis using OT asset data to prioritize risk remediations for renewable energy projects. …
Industrial Defender and aDolus Partner to Secure ICS Supply Chain with Independent File Validation
aDolus and Industrial Defender announce a partnership to mitigate the risk of supply chain attacks in ICS environments. …
What Does the National Maritime Cybersecurity Plan Mean for the MTS?
The National Maritime Cybersecurity Plan highlights the role of the MTS in national security and the supply chain and the need to keep it cyber resilient. …
What Does the SolarWinds’ Sunburst Backdoor Mean for ICS?
While SolarWinds’ Sunburst backdoor is primarily an “IT problem”, what does it mean for ICS and supply chain security? …
MITRE ATT&CK for ICS Matrix: What It Is and How Its Used
The MITRE ATT&CK for ICS Matrix helps security teams make their overall risk discussion more meaningful. This primer discusses what it is and how it’s used. …
Cold Chain Cybersecurity Critical for Effective COVID-19 Vaccine Distribution
With the COVID-19 vaccine distribution right around the corner, it’s critical for stakeholders throughout the cold chain to put cybersecurity protections in place for refrigeration facilities. …
Feature Focus: Building Management System (BMS) Security and Risk Monitoring
Preview threat detection features we’ve built into the ASM for building management systems (BMS), including risk scoring, security monitoring and network analytics. …
Industrial Defender and FoxGuard Solutions Team Up to Transform Patch and Vulnerability Management for OT Security Teams
This partnership combines Industrial Defender’s depth and breadth of asset data collection with FoxGuard’s ability to report, acquire, validate and deploy vendor-approved patch and vulnerability information. …
A Guide to Preventative and Detective Controls for NERC CIP-013 Compliance
The NERC CIP-013 standard addresses cyber threats to the Bulk Electric System (BES) that come from third party vendors in the supply chain. …
Top 5 ICS Security Best Practices
Industrial control systems (ICS) are the heart of our world’s critical infrastructure and must be protected. These are 5 ICS security best practices to consider. …