Articles

admin

Controller Area Network (CAN)
Hacking Controller Area Network (CAN Bus)

Hacking Controller Area Network (CAN Bus) What is Controller Area Network (CAN Bus)? In short words, it’s a communication system made for vehicle intercommunication. It is a network protocol that is commonly used in automobiles to allow different electronic components within the vehicle to communicate with each other over a shared two-wire bus. However, CAN is also…

View details
Cascading Supply Chain Attack
Cascading Supply Chain Attack

Cascading Supply Chain Attack In recent years, supply chain attacks have become one of the most significant threats to cybersecurity. Hackers are using these attacks to gain unauthorized access to systems and data, which can cause a cascade of events that can be devastating to an organization. This article will discuss the cascading supply chain…

View details
OTIFYD Waterfall security Partnership Announcement
OTIFYD and Waterfall Security Partner to Secure OT Networks

OTIFYD and Waterfall Security Partner to Secure OT Networks   London, United Kingdom, April 4, 2023: OTIFYD, EMEA’s next generation OT security services and solutions provider , and Waterfall Security Solutions, the OT security company, today announce a strategic partnership to strengthen industrial cybersecurity in many industries. This collaboration provides OTIFYD’s customers with secure and consolidated IT/OT integration technology that…

View details
Managing Negative PR Implications After a Cyberattack
Managing Negative PR Implications After a Cyberattack on Critical Infrastructure: Guidelines for Effective Crisis Response

Managing Negative PR Implications After a Cyberattack on Critical Infrastructure Guidelines for Effective Crisis Response Cyberattacks on critical infrastructure can have devastating consequences, including negative PR implications for the organization responsible for maintaining the infrastructure. In addition to the immediate risks to public safety, a hack can damage the organization’s reputation, leading to loss of…

View details
IT Security vs OT Security
Why IT Security Companies are Not the Best Choice for Securing Operational Technology

Why IT Security Companies are Not the Best Choice for Securing Operational Technology IT Security Company vs OT Security Company: Why IT Security Companies are Not the Best Choice for Securing Operational Technology As industrial organisations increasingly rely on connected devices and digital systems to manage critical operations, the importance of industrial cybersecurity has become…

View details
OT Attack Surface
OT Attack Surface Management

OT Attack Surface Management The attack surface of an operational technology (OT) system refers to the total exposure of the system to potential security threats. It encompasses all the entry points and attack vectors that an attacker can use to gain access to or compromise the system. The attack surface includes a wide range of…

View details
Industry 4.0 Security
Industry 4.0 Risks and Opportunities

Industry 4.0 Security Risks and Opportunities Industry 4.0, also known as the Fourth Industrial Revolution, is a term used to describe the current trend of automation and data exchange in manufacturing and other industries. This new era of manufacturing is characterised by the use of advanced technologies such as the Internet of Things (IoT), artificial…

View details