Security controls for ICS/SCADA environments

Introduction An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisition systems (SCADA) are a subset of ICS. ... Go on to the site to read the full article ... Read More

Best entry-level cybersecurity jobs for veterans with security clearance

| | General Security
Introduction Military veterans have a variety of in-demand skill sets that make them highly desirable candidates for some of the fast-rising cybersecurity positions in the industry. Along with the... Go on to the site to read the full article ... Read More

How to get security clearance and win more contracts

Introduction Having a security clearance can increase your job options and make you a more sought-after employee. An individual is not authorized to obtain a clearance on their own: they must be... Go on to the site to read the full article ... Read More

ICS/SCADA Security Technologies and Tools

Introduction Industrial Control System (ICS)-embedded architectures differ from standard enterprise systems. ICS are interconnected, like enterprise systems, but the core of ICS is the Programmable... Go on to the site to read the full article ... Read More

Account Management Concepts for ICS/SCADA environments

Introduction Industrial Control Systems (ICS) are part of the Supervisory Control and data acquisition environments. These systems are responsible for the infrastructure of our cities and towns. ICS... Go on to the site to read the full article ... Read More

Access Control Implementation in ICS

Introduction Industrial Control Systems (ICS) differ from traditional information technology (IT) systems, making the implementation of certain security controls difficult. Access Controls (AC) deal... Go on to the site to read the full article ... Read More

Best practices to ensure your organization is focused on the right types of risk

| | General Security
Introduction All organizations face some type of risk. Risks are determined by organization type, clients, workers, vendors and logistics, among many other potential factors. Basically, anything that... Go on to the site to read the full article ... Read More

AWS vs. Azure vs. Cloud+: To specialize, generalize or both?

| | cloud computing
Introduction Cloud technology is continuing to grow. Amazon Web Services (AWS) and Microsoft Azure are two cloud providers and platforms that are dominating the cloud space, but they are not alone.... Go on to the site to read the full article ... Read More

OllyDbg

| | OllyDbg
Introduction OllyDbg is a 32-bit debugging tool used to analyze binary code. Its popularity is tied to the fact that people can do so despite not having access to the source code. OllyDbg can be... Go on to the site to read the full article ... Read More

Analyzing Packed Malware

Introduction Malware is created with deception in mind. Malware authors want to go undetected in order to steal, alter or delete as much information as possible. Obfuscating malware is a way to keep... Go on to the site to read the full article ... Read More