Articles

Free Book: Secure Operations Technology (SEC-OT)

Free Book: Secure Operations Technology (SEC-OT)

Secure Operations Technology documents the SEC-OT perspective, methodology and best practices, including protection against both offline and online cyber attacks, as well as a set of twenty standard cyberattack patterns to use when evaluating the security of industrial sites. Secure Operations Technology is available free of charge via our sponsor Waterfall for a limited time to qualified practitioners.
Cyber Security Challenges, Focuses for 2019

Cyber Security Challenges, Focuses for 2019

Annual Survey on Spend and Trends in Cyber Security

Cyber Security Hub fielded an email survey to subscribers in October 2018 to identify enterprise cyber security trends, among cyber security project owners with direct responsibility and cyber security organizational influencers. This report combines both quantitative and qualitative data for a look at our readers’ views on these pressing questions and more:

• What is the most dangerous threat vector?

• What is the one area of cyber security that needs to change the most in 2019?

• Will mobile devices pose a greater threat in 2019?

• Where will cyber dollars be allocated in the new year?

Industrial IoT Concerns Worsen As More Devices Connect To The Web

Industrial IoT Concerns Worsen As More Devices Connect To The Web

IIoT Disruptions Could Cost Millions As Network Widens

It’s no secret that the “Internet of Things” (IoT) is one of the next big discussion points in the cyber security space. That is, security practitioners are actively seeking ways to shore up defense and get a handle of the network.

ICS Cyber Security: State of the market & expert overview

ICS Cyber Security: State of the market & expert overview

The number of cyber attacks is on the rise and Industrial Control Systems must be secured, in order for global organisations to avoid suffering real, physical damage.

Ahead of the ICS Cyber Security conference, more than 350 experts from all around the world have answered our recent survey and shared their views on the nature of the cyber threat, implementing solutions and in what time frame and their thoughts on the through-life support offered by the industry.