All Research Sponsored By:Dragos

5 CRITICAL CONTROLS FOR WORLD-CLASS OT CYBERSECURITY
EBOOK: Operational technology (OT) cybersecurity has emerged as a top priority for many businesses. How can your business strengthen its OT cybersecurity? Dig into this e-book to discover critical controls for effective OT cybersecurity. #1: An ICS-specific incident response plan. Read on to unlock 4 more controls.
Posted: 28 Oct 2022 | Published: 28 Oct 2022

TOPICS:  .NET

10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURTIY
WHITE PAPER: To protect industrial OT environments, asset visibility plays a critical role. How? Review this white paper to unlock 10 ways that asset visibility builds the foundation for OT cybersecurity.
Posted: 28 Oct 2022 | Published: 28 Oct 2022

TOPICS:  .NET

PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Control Systems
EBOOK: What are the capabilities of CHERNOVITE’S malware specific to Industrial Control Systems? How can you protect your business from this threat? Explore this e-book to review PIPEDREAM’s deployment scenarios and to unlock defense strategies.
Posted: 25 Oct 2022 | Published: 25 Oct 2022

TOPICS:  .NET

HOW TO PREPARE FOR & RESPOND TO RANSOMWARE IN OPERATIONAL TECHNOLOGY (OT) ENVIRONMENTS
WHITE PAPER: How can your business defend against ransomware in its operational technology (OT) environments? People, processes and technology—these are the 3 key areas for which this white paper details recommendations for boosting your business’s preparation and detection strategy. Read on for insight into creating a response strategy.
Posted: 21 Oct 2022 | Published: 22 Oct 2022

TOPICS:  .NET

PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Control Systems
WHITE PAPER: PIPEDREAM is an industrial control systems (ICS)-specific malware, specifically developed to disrupt industrial processes. This white paper analyzes PIPEDREAM, providing insights into how it works, who it is designed to target, and what hardware and software are at risk. Download now and read more about the dangers of PIPEDREAM.
Posted: 10 Sep 2022 | Published: 10 Sep 2022

TOPICS:  .NET

10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURTIY
WHITE PAPER: According to a Sans report, 90% of organizations with OT systems did not know whether they’d had a security incident. Whether they’re running industrial control systems (ICS) or industrial internet of things (IIoT) devices, when organizations track their assets, it becomes easier to protect the OT environment. Read this white paper to learn more.
Posted: 09 Sep 2022 | Published: 09 Sep 2022

TOPICS:  .NET

5 CRITICAL CONTROLS FOR WORLD-CLASS OT CYBERSECURITY
WHITE PAPER: You can’t copy and paste your OT security program from IT. While IT focuses on system and data security, OT must account for systems of systems and physics. Read this white paper, in which Dragos outlines the 5 key controls for developing and maintaining an effective OT cybersecurity operation.
Posted: 09 Jul 2022 | Published: 09 Jul 2022

TOPICS:  .NET