Research &
Intelligence

Your trusted source for the latest ICS vulnerability research, industrial threat intelligence, and educational information about best practices for IIoT, ICS and SCADA security.

Find out how CyberX protects against IoT/ICS threats described in the MITRE ATT&CK for ICS Matrix.

Learn why agentless security is just one of several critical capabilities required to effectively secure unmanaged IoT devices.

Gartner’s latest report examines emerging cybersecurity trends in cyber-physical systems, the CISO’s expanding role to include safety, and the merger...

A data-driven analysis of real-world vulnerabilities observed in more than 1,800 production IoT/ICS networks across all industrial sectors worldwide.

CyberX recently collaborated with NIST and other technology providers such as OSIsoft to produce a report detailing NIST’s recommendations for...

A data-driven analysis of real-world vulnerabilities observed in more than 1,800 production IoT/ICS networks across all industrial sectors worldwide.

NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk...

CyberX's VP of Security Research, David Atch, discusses the ICS Malware Sandbox at S4x18.

Hacking Industrial Control Systems — Chapters 1 & 2 Your Hands-On Guide to ICS Risk Management. Download your complimentary copy...

Get Up to Speed on Threat Modeling for ICS/SCADA Networks Download ICS Hacking Exposed (chapters 1 & 2).Visit us at...

The U.S. Department of Homeland Security (DHS) reports that cyber incidents at energy facilities increased by nearly a third over...

Unified visibility into assets & risk across all your production facilities worldwide.

Passive monitoring with optional active technology — “Hybrid” approach provides comprehensive asset discovery & ongoing management.

A data-driven analysis of real-world vulnerabilities observed in more than 850 production ICS networks across all industrial sectors and 6...

Unlike IT security tools, our OT-specific security platform: Leverages a deep understanding of industrial protocols (DNP3, ICCP, IEC104, IEC61850, OPC,...