Articles

The Real Threat of Ransomware

The Real Threat of Ransomware: Why Cyber Criminals Prefer This Attack Method Even for Industrial Organizations

Ransomware attacks have become an increasingly common threat to organizations of all types, from small businesses to large industrial organizations. While cyber-physical attacks are often seen as the greatest threat to industrial organizations, ransomware attacks can still have significant physical and/or life-threatening consequences. As demonstrated by recent incidents such as the attack on a hospital in Germany that caused the death of a patient, and the ransomware attack on a major airline in the United States that resulted in flight cancellations and disruptions to travel, the impact of ransomware on industrial systems can be just as serious as that of cyber-physical attacks, if not more so. Furthermore, many industrial organizations have complex supply chains that rely on interconnected systems and processes, so an attack on one organization can have ripple effects throughout the entire supply chain, as seen in the recent incidents involving the Colonial Pipeline and the world’s largest meat supplier, JBS. Given the ease of deployment and potential for profit, ransomware remains a serious threat to organizations, and it is essential for organizations to take steps to protect themselves against these types of attacks.

Read More
Tabletop Exercises

Tabletop Exercises in Cybersecurity and Beyond

Learn how tabletop exercises can improve your cybersecurity plans and procedures and discover the next level of innovation in TTX.

Read More
Cybersecurity Learning Objectives

ThreatGEN Increases Cybersecurity Student Engagement Aligned with Key Learning Objectives

ThreatGEN® Red vs. Blue provides a mapping to Bloom’s Taxonomy for student learning objectives.

Read More
Cybersecurity Workforce

Achieving a Stronger Cybersecurity Workforce

Despite a skills shortage in the cybersecurity industry, simply having a college degree is no longer enough. It’s still a competitive industry and employers are looking for candidates that are well qualified. Students need an educational program that prepares them for real-world cybersecurity and a successful career path. Unfortunately, traditional training methods just might not make the grade any longer. So, how do educators provide students with a solid cybersecurity foundation and set them up for success in the real world?

Read More

OT Cyber Risk Management – You’re Probably Doing It Wrong

The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them In this article, I will discuss the 3 most common mistakes people still make when assessing and addressing OT cyber risk management (hint: most of you are still doing it backwards), and ways that you can make…

Read More
ThreatGEN

Florida Water Treatment Plant Attack

Since there are plenty of threat monitoring sources throughout our industry, we thought it best not to repeat those concerning the Florida water treatment plant attack.  ThreatGEN believes it is worthwhile to have a lessons learned after the the dust settles though.  The reason we didn’t release immediately after the event, like everyone else, is…

Read More
Capture the Flag (CTF)

CTF – “You keep using that word. I do not think it means what you think it means.”

Capture the flag (CTF) competitions are played in the cybersecurity community all over the world. What is its history? What are we missing?

Read More
SolarWinds

What Could the SolarWinds Attack Mean for OT?

Jonathan Bundy reviews the SUNBURST malware attack on SolarWinds clients.

Read More
gamification

Gamification vs. Games

ThreatGEN’s Aaron Shbeeb delves into the differences between games and gamification as well as defining good gamification attributes.

Read More
cybersecurity statistics

Lies, Damned Lies, and Cybersecurity Statistics

ThreatGEN brings together multiples sources for its list of cybersecurity statistics, their sources, and some of our own.

Read More

Categories