A water authority conducted Red Team exercises simulating a physical breach whereby the team gained access to the network via a physical connection at a control panel at two of the unmanaged locations. The result was a success with PacketViper protecting …
PacketViper today announced that it has been named a manufacturer on the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer CHESS. This contract is held by Carahsoft Technology Corp.
The post PacketVi…
Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disrupt…
Ransomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat act…
How can you transform threat hunting? Consider this home security scenario: Imagine you have a choice of two home security systems: The first one only alerts you about intruders after they have broken into your house. The second one works when the threat …