The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.
As municipalities and other critical infrastructure OT operators pursue or expand remote operations capabilities, we want to regularly demonstrate that XONA...
The collision of Microsoft and Oracle patches on the same day has contributed to risk and stress for organizations.Vulnerability disclosures for 2020 are...
More scrutiny of products for industrial control systems is expected to expose even more weaknesses in devices that run critical infrastructure. It started...
IOTech, the Intelligent Edge Software company, announced the general availability of Edge XRT, a new software platform for time-critical and resource-constrained applications at...
The Israeli authorities are alerting organizations in the water industry following a series of cyberattacks that hit water facilities in the country. The...