RECAP: OT NETWORKS VISIBILITY AND SECURITY WEBINAR
ATS has recently concluded its first webinar as a certified Cisco IoT Advantage Specialization Partner.
Participating in Cisco’s IoT Advantage Specialization Partner program and adding Cisco’s solution to our OT cyber security solutions portfolio, has enabled ATS to widen our cyber security strategy playbook and approach the prevailing issue of industrial cyber security issue head-on.
IFAT AFTER COVID-19: THE VALUE OF GOING VIRTUAL
When listing the most dangerous industrial technology malware, a recent article by Stormshield ended on an ominous note. After shortly discussing the impacts of Shamoon, Industroyer, Triton and Stuxnet on world industry and economy, the last – and most threatening – malware on their 5-point list was left unnamed and unidentified.
OT NETWORKS VISIBILITY AND SECURITY: A WEBINAR BY ATS AND CISCO
As cyber threats to critical infrastructure sites around the world continue to dominate news cycles, the topic of industrial cyber security becomes an increasingly important point of discussion.
ATS Advanced Technical Solutions is therefore happy to announce the first upcoming webinar as a certified Cisco IoT Advantage Specialization Partner.
THE PRESSURE IS RISING: THE RECENT CYBER-ATTACK ON COLONIAL PIPELINE
When listing the most dangerous industrial technology malware, a recent article by Stormshield ended on an ominous note. After shortly discussing the impacts of Shamoon, Industroyer, Triton and Stuxnet on world industry and economy, the last – and most threatening – malware on their 5-point list was left unnamed and unidentified.
INDUSTRIAL CYBER SECURITY: CASE HISTORY ON THE TRITON ATTACK – THE WORLD’S MOST DANGEROUS MALWARE
As the world’s largest industrial complexes undergo digitization efforts, and as the Industrial Internet of Things (IIoT) becomes integrated into processes of oversight, management, operation and production, the number of potential threats to this new way of business also rises. We wrote about some of the reasons to increase your cyber security in our previous article.
ICS/OT CYBER SECURITY FUNDAMENTALS: 5 REASONS TO PROTECT YOUR COMPANY
Implementing an effective and comprehensive operational technology (OT) cybersecurity strategy is more crucial than ever before.
Most companies have long been implementing thorough IT security measures to protect their data and digital assets, but it wasn’t always the case for OT environments. With the growth of the Industrial Internet of Things (IIoT) and the convergence of IT and OT as companies seek improved connectivity through the internet and enterprise technologies, the risk for malicious cyberattacks became increasingly pertinent in OT environments.