Industrial Control Systems (ICS) have traditionally been isolated from a company’s Information Technology (IT) infrastructure. This inherent isolation essentially created an ‘air gap’ between the ICS and IT environments.Read More
Critical infrastructure is now under constant threat from cyber adversaries seeking to exploit vulnerable systems and networks to achieve their objectives.
The Triton attack caused the entire operation to shut down and is one of the many examples in recent years of malicious software designed specifically to target industrial equipment.
The cybersecurity practices of Australian universities are in the spotlight after the recent significant breach of Australian National University’s (ANU) IT systems.
In 2016, a water treatment plant in the US was the victim of a sophisticated and methodical attack, where cyber criminals remotely took control over the treatment process and threatened to poison households.
A new class of cyber threat has been evolving over the last decade or so to now represent a well-resourced and highly trained class of adversary.
Stay ahead of the threat
Join our community to receive the latest cybersecurity insights.