The manufacturing industry is increasingly reliant on technology and connectivity to drive efficiency and productivity. As a result, it has become a prime target for cyber attacks. Source: Plex Systems’ 2022 state of smart manufacturing report, cybersecurity...
Abstract Cyber security increasingly infiltrates industrial and critical infrastructures. This is due to the IT / OT convergence and modernization procedures dictated by industry 4.0. These processes are characterized by providing previously closed and isolated...
The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d’être of vulnerability...
‘Control System Defense: Know the Opponent’ – published by the National Security Agency and the Cybersecurity & Infrastructure Security Agency – breaks down the steps malicious actors take to compromise critical infrastructure control...
Cookies are used on this website. Cookies are files that store identifying information on website visitors’ endpoint. In accordance with the provisions of Directive 2002/58/EC of the European Parliament and of the Council on the processing of personal data and the protection of privacy in the electronic communications sector, users are hereby informed in advance on the purposes of cookie usage. CustomizeAccept All
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
These cookies are set via embedded youtube-videos. They register anonymous statistical data on for example how many times the video is displayed and what settings are used for playback.No sensitive data is collected unless you log in to your google account, in that case your choices are linked with your account, for example if you click “like” on a video.