exida

exida explains Blog

Entries tagged with: Cybersecurity

Training in 2020 and Beyond.  Adapting to COVID-19 with Online Solutions.
  • by Rick Smith
  • Tuesday, March 31, 2020
  • News

Training in 2020 and Beyond.  Adapting to COVID-19 with Online Solutions.

What can OT learn from IT data breaches?

What can OT learn from IT data breaches?

Does your organization even have a CISO position?

Cybersecurity continues to be an overlooked aspect in organizations—including those owning ICS (Industrial Control System) production facilities. Anyone following the news has most assuredly heard of the plethora of massive data breaches that organizations have endured over the last…

Read More...

What is a Pragmatic Approach to Cybersecurity?

What is a Pragmatic Approach to Cybersecurity?

Now that we have a little bit of context on what's driving our current cybersecurity landscape. The next question is, “where does this pragmatic approach come in?  What is a pragmatic approach? What does the word pragmatic mean? The dictionary definition is dealing with things sensibly and realistically in a…

Read More...

  • by Iwan van Beurden, CFSE
  • Tuesday, January 17, 2012
  • Certification

Why am I not on “the list?”

Why is Cybersecurity Hygiene Important for Automation Systems?

Why is Cybersecurity Hygiene Important for Automation Systems?

Cybersecurity incidents have shown that there can be major consequences for automation systems. There have been incidences where attackers have been able to manipulate the human resource interface console directly. It was only by chance that an operator in one particular instance happened to notice that his mouse pointer…

Read More...

Why the Docker Breach is Noteworthy

Why the Docker Breach is Noteworthy

All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be patching software, revising work processes or altering incident response techniques.

Docker

Read More...

Page 4 of 4 pages ‹ First  < 2 3 4