The Headache Caused by Protecting Unmanned Distributed Sites March 31, 2017 In recent years, the awareness for securing industrial control systems (ICS) has greatly increased. Since around 2014, many companies have started implementing cyber security solutions to...
Are Schools Ready for Cyber Attacks? June 23, 2016 Are schools ready for a cyberattack? When parents send their children to school, they believe that the school will educate them, teach them manners, and prepare them for the real life. But before the teaching starts,...
Detection of Unauthorized Changes in a PLC’s Logic April 27, 2016 The Deep-Packet-Inspection (DPI) protocol for industrial network traffic is one of the fundamental technologies currently used in protecting ICS networks. Using this technology, security products...
Calculating the Cost of a Power Outage By Rani Kahat, VP Business Development, Radiflow February 24, 2016 What is the cost of a power outage caused by a cyber-attack? And how does one calculate the predicted cost? Beyond the actuary purpose of estimating the cost of a...
Convergence of Cyber & Physical Security to Protect OT Networks February 4, 2016 Bringing together Cyber and Physical security Integrated physical security systems, e.g. between a video surveillance system and a swipe card-based access control/user permissions...
Analysis of the Ukrainian Outage By Yehonatan Kfir, CTO, Radiflow January 21, 2016 As the smoke starts to clear around the Ukrainian power outage–a significant case of a confirmed cyber-attack that left tens of thousands of people in the dark–more and more details are...
Recent Comments