MITRE CalderaTime to SubscribeCOV: New BACnet Plugin Abilities!Authors: Misha Belisle & Blaine Jeffries1d ago
InMITRE Engage™byMaretta MorovitzThe Methodology Behind the MITRE Engage Mappings for ATT&CK for ICS and ATT&CK for Mobile (Part 2)This is part two of a two part series on the Engage to ATT&CK for ICS and Mobile mappings. Part one can be found here.6d ago
Robert VamosiKeeping The Lights On In UkraineWhat would happen if your GPS signal were jammed? It would impact more than just navigation — you’d also lose access to financial data and…Nov 20Nov 20
Mehdi Nacer KERKAR - CISSP, ISMS LA, CCSK,eWPTx,CCCybersecurity in Industrial Control Systems (ICS) vs. Plant IT Systems🔐Part 1As industrial attacks rise, CIOs face new challenges in securing both IT and ICS. Here’s a look at key differences and essential strategies.Nov 28Nov 28
RocketMe Up CybersecuritySecuring Operational Technology (OT) Environments — Addressing Modern Cybersecurity ChallengesA guide to securing OT environments, addressing vulnerabilities, and implementing best practices for resilient operations.Nov 10Nov 10
MITRE CalderaTime to SubscribeCOV: New BACnet Plugin Abilities!Authors: Misha Belisle & Blaine Jeffries1d ago
InMITRE Engage™byMaretta MorovitzThe Methodology Behind the MITRE Engage Mappings for ATT&CK for ICS and ATT&CK for Mobile (Part 2)This is part two of a two part series on the Engage to ATT&CK for ICS and Mobile mappings. Part one can be found here.6d ago
Robert VamosiKeeping The Lights On In UkraineWhat would happen if your GPS signal were jammed? It would impact more than just navigation — you’d also lose access to financial data and…Nov 20
Mehdi Nacer KERKAR - CISSP, ISMS LA, CCSK,eWPTx,CCCybersecurity in Industrial Control Systems (ICS) vs. Plant IT Systems🔐Part 1As industrial attacks rise, CIOs face new challenges in securing both IT and ICS. Here’s a look at key differences and essential strategies.Nov 28
RocketMe Up CybersecuritySecuring Operational Technology (OT) Environments — Addressing Modern Cybersecurity ChallengesA guide to securing OT environments, addressing vulnerabilities, and implementing best practices for resilient operations.Nov 10
MITRE CalderaNEW MITRE Caldera™ for OT Plugins: Profinet and IEC 61850!Authors: Misha Belisle, Blaine Jeffries & Devon ColmerJan 11
Robert VamosiHacking Android-Based Industrial Control SystemsCybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to violence …Nov 6
InCenter for Threat-Informed DefensebyMike CunninghamGuarding the Grid: Defending Operational Technology with ATT&CKidentify and defend against adversarial techniques that impact operations on critical infrastructureAug 15