Research &
Intelligence

Your trusted source for the latest IoT/ICS security best practices, vulnerability research, and threat intelligence.

Gartner’s latest report examines emerging cybersecurity trends in cyber-physical systems, the CISO’s expanding role to include safety, and the merger...

Learn why agentless security is just one of several critical capabilities required to effectively secure unmanaged IoT devices.

A data-driven analysis of real-world vulnerabilities observed in more than 1,800 production IoT/ICS networks across all industrial sectors worldwide.

NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.

Learn what ARC industry experts recommend as best practices for reducing risk from unmanaged IoT devices.

The risks associated with OT differ significantly from those related to IT – and they need to be understood by...

The EU recently passed the Network and Information Security (NIS) Directive (NISD), requiring critical infrastructure organizations to implement stronger security...

In 2015, CyberX’s threat intelligence team reverse-engineered BlackEnergy3 and discovered it was designed to perform exfiltration of sensitive information from...

Hacking Industrial Control Systems — Chapters 1 & 2 Your Hands-On Guide to ICS Risk Management. Download your complimentary copy...

Months before Mirai malware was found to be infecting IoT devices, CyberX's threat intelligence team discovered RADIATION. Targeting surveillance cameras...

The CyberX Threat Intelligence team has discovered numerous zero-day vulnerabilities in Programmable Logical Controllers (PLCs) and industrial equipment, ranging from...

A data-driven analysis of real-world vulnerabilities observed in more than 850 production ICS networks across all industrial sectors and 6...

A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis...