Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
WaterISAC Announcement Contact: Kaitlyn Palatucci Phone: 202-420-9343 Email: palautcci@waterisac.org WASHINGTON, D.C., JULY 6 — WaterISAC welcomes its newest Champion, Gate…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By Ben Taylor Incident Overview On 05 Feb, unidentified cyber actors accessed the supervisory control and data acquisition (SCADA) system…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
By Jennifer Lyn Walker, The Cybersecurity Evangelist You may have noticed I didn’t publish a December episode of TCE. We…
By Jennifer Lyn Wallker In this third episode of The Cybersecurity Evangelist (TCE), I am joined by Shay Trembley. Shay…
In a blog post on 28 Jul, security researchers at Claroty shared that they have “discovered remote code execution vulnerabilities affecting virtual private network (VPN) implementations primarily used to provide remote access to operational technology (OT) networks. These dedicated remote access solutions are mainly focused on the industrial control system (ICS) industry… Exploiting these vulnerabilities can give an attacker direct access to the field devices and cause some physical damage.”
At Gate 15, we spend a lot of time discussing Blended Threats. A Blended Threat is a natural, accidental, or purposeful physical or cyber danger that has or indicates the potential to have crossover impacts and harm life, information, operations, the environment, and/or property.