Newsroom

Featured
Recent News
Introduction to ICS Security – Part 2
Introduction to ICS Security – Part 2

Discover how to overcome key challenges in ICS cybersecurity as we dive into the Purdue Enterprise Reference Architecture (PERA), and best practices for securing OT environments...

read more
Introduction to ICS Security
Introduction to ICS Security

Do you ever wonder what exactly Industrial Control Systems are or why you should care?  What makes something Critical Infrastructure? What are the unique challenges of securing...

read more
Colonial Pipeline Attack FAQ
Colonial Pipeline Attack FAQ

It is now well known that Colonial Pipeline operations were proactively halted on May 7th as the result of a ransomware incident. A tremendous amount has already been...

read more
Lessons Learned from the Hafnium Attack
Lessons Learned from the Hafnium Attack

An Aggressive, Orchestrated, Global Attack Government officials and the cybersecurity community are still reeling after learning the extent of the Hafnium attack that was widely...

read more