We see very often how companies (through their security staff) go shopping and rush to spend, often pushed by the pressure of the business, the inertia of the market, lack of knowledge, skill and opportunism of suppliers, before performing a good risk assessment.
Note: This content requires site login.
Recent Posts
- Cuba ransomware uses Veeam exploit against critical U.S. organizations August 25, 2023
- Physical attacks on power grid surge to new peak – Power Grid Sabotage July 18, 2023
- Cisco warned customers of a high-severity cisco switch vulnerabilities. July 18, 2023
- CosmicEnergy ICS Malware Updates June 17, 2023
- Pemex refinery blaze injures four May 30, 2023
- What is Evil PLC attack and how to prevent negative consequences on industrial plants March 10, 2023
- CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems February 10, 2023
- Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices January 28, 2023
- CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks January 15, 2023
- New attacks use Windows security bypass zero-day to drop Qbot malware November 20, 2022
- Rationalization: Stop spending valuable resources wrongly November 13, 2022
- Construction of Awareness and Training Programs August 25, 2022
- Digital transformation in industrial cybersecurity June 16, 2022
- Wind turbine firm Nordex hit by Conti ransomware attack April 14, 2022
- WisePlant turns 10! February 28, 2022
- Automation Systems Cybersecurity: From Standards to Practices January 4, 2022
- Working with future and new systems (Special Edition) December 7, 2021
- A factory fire in Hull, UK, involved 300 tonnes of plastic November 30, 2021
- Coal mine explosion leaves 51 dead and dozens injured in Russia November 26, 2021
- IEC designates ISA/IEC-62443 as horizontal standard November 26, 2021