Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the…
Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the Spotify…
Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the…
Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy this episode of The Gate 15 Interview podcast on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
WaterISAC Announcement Contact: Kaitlyn Palatucci Phone: 202-420-9343 Email: palautcci@waterisac.org WASHINGTON, D.C., JULY 6 — WaterISAC welcomes its newest Champion, Gate…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By Ben Taylor Incident Overview On 05 Feb, unidentified cyber actors accessed the supervisory control and data acquisition (SCADA) system…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
By Jennifer Lyn Walker, The Cybersecurity Evangelist You may have noticed I didn’t publish a December episode of TCE. We…
By Jennifer Lyn Wallker In this third episode of The Cybersecurity Evangelist (TCE), I am joined by Shay Trembley. Shay…
In a blog post on 28 Jul, security researchers at Claroty shared that they have “discovered remote code execution vulnerabilities affecting virtual private network (VPN) implementations primarily used to provide remote access to operational technology (OT) networks. These dedicated remote access solutions are mainly focused on the industrial control system (ICS) industry… Exploiting these vulnerabilities can give an attacker direct access to the field devices and cause some physical damage.”
At Gate 15, we spend a lot of time discussing Blended Threats. A Blended Threat is a natural, accidental, or purposeful physical or cyber danger that has or indicates the potential to have crossover impacts and harm life, information, operations, the environment, and/or property.