by Gate 15 | Jul 1, 2019 | Uncategorized
By Omar Tisza Are the physical and cyber security of our critical infrastructure fated to merge into a blended and complex risk management approach? In this update on threats that are neither entirely comprised of physical or cyber parts, known as blended and complex...by Gate 15 | May 1, 2019 | Uncategorized
On 05 Mar 2019, Trend Micro posted, “Exposed IoT Automation Servers and Cybercrime,” a fascinating look at Complex IoT Environments (CIEs) and have also shared a fuller understanding of their findings in “Cybersecurity Risks in Complex IoT Environments: Threats...by Gate 15 | Mar 1, 2019 | Uncategorized
By Omar Tisza As cyber-adversaries become sophisticated in their attacks against critical infrastructure, we see the level of sophistication between nation state and criminal threat actors increasingly blur as both groups seem to use many of the same tools and tactics...by Gate 15 | Feb 4, 2019 | Uncategorized
by Omar Tisza With January already in the rearview mirror–and the proliferation of complex and blended threatsgrabbing the attention of more and more security practitioners like high beams on a semi-truck–we have curated poignant examples of threats, attacks, and...