During the past decade, we have witnessed a virtual explosion in the cyber security world….we have lived through and...
Blog
Here are 50 Companies Leading the AI Revolution
SEC Intelligence Editor - Britta Schmidt, , Artificial Intelligence, Artificial Intelligence, 0We know that artificial intelligence will soon reshape our world. But which companies will lead the way? To help...
North Korean Hackers Used Hermes Ransomware to Hide Recent Bank Heist
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Security, cybersecurity, InfoSec, Ransomware, 0Evidence suggests the infamous Lazarus Group, a hacking crew believed to be operating out of North Korea, is behind...
Increasing Cybersecurity Investments in Private Sector Firms
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Security, Critical Infrastructure, cybersecurity, InfoSec, IT Security, 0The primary objective of this article is to develop an economics-based analytical framework for assessing the impact of government...
Critical Visualization: a Case for Rethinking how we Visualize Risk and Security
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Security, cybersecurity, IT Security, Ransomware, 0In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded...
India and the Industrial Internet of Things
SEC Intelligence Editor - Britta Schmidt, , Business, Infrastructure, IIoT, 0India is poised to be a leader in the use of technology, and according to R.S. Sharma, Chairman of...
Asset visibility and inventory: the starting point for OT security
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Security, OT, OT Security, 0Energy and utility service providers around the world are constantly exploring new methods to improve the security of their...
Distinctions: Threat Information vs.Threat Intelligence
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Security, CyberSec, cybersecurity, Industrial IoT, Information Security, InfoSec, Infrastructure, IT Security, risk analysis, 0Distinctions: Threat Information vs.Threat Intelligence Finished Intelligence is the Output of Taking Threat Information, Evaluating it and Deriving a...
Cyber Security Risk Management in Canada: Nine Things Happening in 2017
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Security, Breach, Compliance, CyberSec, cybersecurity, IIoT, InfoSec, IT Security, risk management, Security, 0Cyber Security Risk Management in Canada: Nine Things Happening in 2017 FireEye in partnership with legal firm Miller Thomson...
BSA EU Cybersecurity Dashboard Report – Spain
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Reports, Security, BSA, CERT, Cyber Country Reports, CyberSec, cybersecurity, IIoT, Information Security, InfoSec, Infrastructure, IT Security, Spain, 0BSA EU Cybersecurity Dashboard Report – Spain The purpose of this report — the first-of-its-kind; BSA EU Cybersecurity Dashboard...
Featured Articles
- Industrial network security best practice advice December 15, 2021
- Industrial Processes Move to the Cloud November 15, 2021
- Cloud-based software solutions for industrial applications October 15, 2021
- 3 Keys to Securing Converged IT/OT Environments September 15, 2021
- ICS SCADA With Secure Clouds August 15, 2021