Research &
Intelligence

Your trusted source for the latest ICS vulnerability research, industrial threat intelligence, and educational information about best practices for IIoT, ICS and SCADA security.

A data-driven analysis of real-world vulnerabilities observed in more than 1,800 production IoT/ICS networks across all industrial sectors worldwide.

NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk...

CyberX's VP of Security Research, David Atch, discusses the ICS Malware Sandbox at S4x18.

Hacking Industrial Control Systems — Chapters 1 & 2 Your Hands-On Guide to ICS Risk Management. Download your complimentary copy...

Get Up to Speed on Threat Modeling for ICS/SCADA Networks Download ICS Hacking Exposed (chapters 1 & 2).Visit us at...

The U.S. Department of Homeland Security (DHS) reports that cyber incidents at energy facilities increased by nearly a third over...

Unified visibility into assets & risk across all your production facilities worldwide.

Passive monitoring with optional active technology — “Hybrid” approach provides comprehensive asset discovery & ongoing management.

A data-driven analysis of real-world vulnerabilities observed in more than 850 production ICS networks across all industrial sectors and 6...

Unlike IT security tools, our OT-specific security platform: Leverages a deep understanding of industrial protocols (DNP3, ICCP, IEC104, IEC61850, OPC,...

"If you are in critical infrastructure you should plan to be targeted. And if you are targeted, you will be...

The risks associated with OT differ significantly from those related to IT – and they need to be understood by...

The EU recently passed the Network and Information Security (NIS) Directive (NISD), requiring critical infrastructure organizations to implement stronger security...

In this educational webinar led by Tim Conway and Doug Wylie from SANS, with Phil Neray from industrial cybersecurity firm...

Demonstrating Stuxnet-like sophistication, the adversaries exhibited a high-level of planning and resources consistent with past nation-state attacks on critical infrastructure....