Support Login.

1 × 2 =

 

Blogs

Lights, Cameras, Hack(tion)

15:39 15 March in Blogs

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

Measuring the Effectiveness of Your Security Controls

08:00 06 March in Blogs, Threat Research

Performing regular assessments to determine the efficacy of security programs is foundational to understanding the reliability of programs, security gaps, compliance issues, and whether security technology is ending up as “shelfware”. To gain continued program support and funding, information security teams are expected to...

The Benefits of Deception for SCADA Environments

14:00 01 March in Blogs, Energy

Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While this particular vulnerability is limited to GE Proficy and...