Articles

Cybersecurity Learning Objectives

ThreatGEN Increases Cybersecurity Student Engagement Aligned with Key Learning Objectives

ThreatGEN® Red vs. Blue provides a mapping to Bloom’s Taxonomy for student learning objectives.

Read More
Cybersecurity Workforce

Achieving a Stronger Cybersecurity Workforce

Despite a skills shortage in the cybersecurity industry, simply having a college degree is no longer enough. It’s still a competitive industry and employers are looking for candidates that are well qualified. Students need an educational program that prepares them for real-world cybersecurity and a successful career path. Unfortunately, traditional training methods just might not make the grade any longer. So, how do educators provide students with a solid cybersecurity foundation and set them up for success in the real world?

Read More

OT Cyber Risk Management – You’re Probably Doing It Wrong

The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them In this article, I will discuss the 3 most common mistakes people still make when assessing and addressing OT cyber risk management (hint: most of you are still doing it backwards), and ways that you can make…

Read More
ThreatGEN

Florida Water Treatment Plant Attack

Since there are plenty of threat monitoring sources throughout our industry, we thought it best not to repeat those concerning the Florida water treatment plant attack.  ThreatGEN believes it is worthwhile to have a lessons learned after the the dust settles though.  The reason we didn’t release immediately after the event, like everyone else, is…

Read More
Capture the Flag (CTF)

CTF – “You keep using that word. I do not think it means what you think it means.”

Capture the flag (CTF) competitions are played in the cybersecurity community all over the world. What is its history? What are we missing?

Read More
SolarWinds

What Could the SolarWinds Attack Mean for OT?

Jonathan Bundy reviews the SUNBURST malware attack on SolarWinds clients.

Read More
gamification

Gamification vs. Games

ThreatGEN’s Aaron Shbeeb delves into the differences between games and gamification as well as defining good gamification attributes.

Read More
cybersecurity statistics

Lies, Damned Lies, and Cybersecurity Statistics

ThreatGEN brings together multiples sources for its list of cybersecurity statistics, their sources, and some of our own.

Read More

OT/ICS Cybersecurity Kill Chain video released

In this video, Pascal Ackerman demonstrates an OT/ICS cybersecurity attack on a control system, from start to finish, through the entire ICS Cybersecurity Kill Chain. While this is an in-depth technical demo, no technical experience or knowledge is required to understand it.

Read More

Checking for ICS Internet Exposure Using Shodan.io

Pascal Ackerman takes the reader through the process of performing an internet exposure check for your ICS.

Read More

Categories