Claroty Researchers Introduce Open-Source Tool for Parsing AccessDB Files Posted on July 14, 2020July 28, 2020 by Jennifer Leggio
MITRE ATT&CK for ICS Framework: Detecting Adversary Techniques with Claroty Posted on June 25, 2020February 8, 2021 by Jennifer Leggio
How Pharmaceutical Companies Can Fast-Track OT Security Posted on June 24, 2020February 8, 2021 by Jennifer Leggio
Industry Experts Speak on Stress Testing the New Normal of IT-OT Relationships Posted on June 23, 2020February 8, 2021 by Jennifer Leggio
Ripple20: New Remote Code Execution Vulnerabilities Affect Millions of Devices Posted on June 18, 2020February 8, 2021 by Jennifer Leggio
Fostering Cooperation Between IT Security Teams and OT Personnel Posted on June 17, 2020February 8, 2021 by Jennifer Leggio
How Water Utilities Can Keep Operational Technology Flowing Smoothly Posted on June 15, 2020February 8, 2021 by Jennifer Leggio
CISO Series: Why Integrations Matter When Picking an OT Security Provider Posted on June 1, 2020February 11, 2021 by Jennifer Leggio
EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery Posted on May 28, 2020February 11, 2021 by Jennifer Leggio
Internet-Facing ICS Devices an Accessible Target for Adversaries Posted on May 27, 2020March 1, 2021 by Jennifer Leggio
Verizon’s 2020 Data Breach Investigation Report: an OT-Security Perspective Posted on May 21, 2020February 11, 2021 by Jennifer Leggio