How to Prevent Ransomware in Industrial Control Systems

How to Prevent Ransomware in Industrial Control Systems

Del Rodillas, our solution lead for SCADA & Industrial Control Systems, recently appeared in Electric Light & Power to discuss ransomware as an emerging threat for Operational Technology environments. With ransomware on everyone’s mind these days, Del shares insights from the recent report published by Unit 42 and instructs ICS owners and operators on how [...]

Understanding Angler Exploit Kit – Part 2: Examining Angler EK

Understanding Angler Exploit Kit – Part 2: Examining Angler EK

This is the second part of a two-part blog post for understanding Angler exploit kit (EK). The first part covered EKs in general. This blog focuses on the Angler EK. Angler is currently one of the most advanced, effective, and popular exploit kits in the cyber criminal market. It generally uses the most recent exploits [...]

The Disappearing Demarcation Between IT and Security

The Disappearing Demarcation Between IT and Security

There’s been a longstanding belief that IT and security teams are at odds with each other. This is because their measures for performance are, on the surface, almost contradictory with one another. IT must find ways to provide the applications that the business needs. But business conditions change rapidly, and the applications the organization needs [...]

Customer Spotlight: Sielte SpA Achieves a New Preventive Security Posture

Customer Spotlight: Sielte SpA Achieves a New Preventive Security Posture

Sielte SpA is an international cloud-based information and communication technology (ICT) service provider that provides telecommunication and energy systems across fixed networks, mobile and wireless networks, and equipment and systems. Sielte has over 500 customers operating in its cloud, encompassing approximately 10,000 devices and a wide range of applications. With such high levels of activity, Sielte [...]