First they came for our data, now they come for our infrastructureThis article was first published at Digital Pulse on 19 January 2016.Jan 22, 2016Jan 22, 2016
The top 10 cyber security vulnerabilities in operational technology systemsOperational Technology (OT) systems are used to control a wide range of industrial processes and critical infrastructure, particularly in…Dec 8, 2015Dec 8, 2015
SANS SEC660 (GXPN) Buffer Overflow for your BrainWell I know I am not the best at blogging these days, but with the move to Australia to run the Threat & Vulnerability Management team for…Nov 27, 2015Nov 27, 2015