ics

November 30, 2023
In our blog defining Defense in Depth, we explained briefly why the approach should be applied to industrial control systems...
June 28, 2023
The OSI (Open Systems International) model is a conceptual reference model used to describe how different devices and systems...
June 16, 2023
Internal Network Security Monitoring (INSM) is a process or solution that monitors activity on a network with the goal of...
May 25, 2023
Most people in the ICS/OT space are familiar with the Purdue model as a well-known framework for organizing OT networks....
December 8, 2022
Much has been made of recent ransomware and cyberattacks impacting critical infrastructure – and those incidents are worth...
October 14, 2022
Even among highly-trained professionals, there can be confusion regarding terms like SCADA vs industrial IoT. The differences...
September 15, 2022
Supervisory control and data acquisition (SCADA) systems are the foundation of a rapidly growing ICS industry that oversees...
September 1, 2022
How do cybersecurity needs differ for OT vs IT? Operational technology (OT) and information technology (IT) may seem similar...
June 2, 2022
SynSaber recently celebrated an important anniversary — it has been one year since our OT security startup received initial...
May 17, 2022
Part 1 of the series saw us slaying the toxic manifestation of what the ICS Unicorn had become, and in Part 2,...