Delve into Darkreading's curated compilation of emerging enterprises at the forefront of constructing technology and solutions aimed at evaluating the risk landscape of AI systems and machine learning models. As the realm of artificial intelligence (AI) extends beyond...
Exploring Beepy – A Palm-Sized Linux Hacking Playground
In a world where technology evolves at an unprecedented pace, there are few things as exciting as stumbling upon a device that captures the spirit of the past while embracing the possibilities of the future. The Beepy, a compact handheld device developed by SQFMI,...
The Challenge of Cybersecurity for Healthcare
In today's digital era, the healthcare industry relies heavily on technology to deliver efficient and advanced medical services. While this digitization has brought remarkable benefits, it has also exposed healthcare organizations to cyber threats that can compromise...
Purdue Model for Industrial Control Systems | Infographic
The Purdue Model, also known as the Purdue Enterprise Reference Architecture (PERA) model, is a framework used for Industrial Control Systems (ICS) security. It provides a hierarchical approach to organizing and securing industrial control systems. When it comes to...
Cybersecurity in manufacturing | Infographic
The manufacturing industry is increasingly reliant on technology and connectivity to drive efficiency and productivity. As a result, it has become a prime target for cyber attacks. Source: Plex Systems' 2022 state of smart manufacturing report, cybersecurity edition...
The future of industrial threat intelligence
Abstract Cyber security increasingly infiltrates industrial and critical infrastructures. This is due to the IT / OT convergence and modernization procedures dictated by industry 4.0. These processes are characterized by providing previously closed and isolated...
Comparing vulnerability assessment with MITRE ATT&CK based gap analysis
The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d'être of vulnerability assessment...
Defend Against Malicious Actors’ Game Plan | Infographic
'Control System Defense: Know the Opponent' - published by the National Security Agency and the Cybersecurity & Infrastructure Security Agency - breaks down the steps malicious actors take to compromise critical infrastructure control systems so that you can...