Mandiant Threat Intelligence has researched and written extensively on the increasing financially motivated threat activity directly impacting operational technology (OT) networks. Some of this research is...
Read moreMandiant Threat Intelligence has researched and written extensively on the increasing financially motivated threat activity directly impacting operational technology (OT) networks. Some of this research is...
Read moreMonitoring ICS Cyber Operation Tools and Software Exploit Modules To Anticipate Future Threats
March 23 2020There has only been a small number of broadly documented cyber attacks targeting operational technologies (OT) / industrial control systems (ICS) over the last decade. While fewer...
Read moreMonitoring ICS Cyber Operation Tools and Software Exploit Modules To Anticipate Future Threats
March 23 2020There has only been a small number of broadly documented cyber attacks targeting operational technologies (OT) / industrial control systems (ICS) over the last decade. While fewer...
Read moreThe FireEye Approach to Operational Technology Security
December 11 2019Today FireEye launches the Cyber Physical Threat Intelligence subscription, which provides cyber security professionals with unmatched context, data and actionable analysis on threats and risk to ...
Read moreThe FireEye OT-CSIO: An Ontology to Understand, Cross-Compare, and Assess Operational Technology Cyber Security Incidents
September 30 2019The FireEye Operational Technology Cyber Security Incident Ontology (OT-CSIO) While the number of threats to operational technology (OT) have significantly increased since the discovery of...
Read more
Recent Comments