Gamification vs. Games
games, gamification, training
|A lot of people play video games. According to NewZoo's article "Video Game Industry Statistics in 2020", in 2019 over 2.7 billion people played video games. That's more than 1 out of every 3 people who voluntarily spend their leisure time pursuing video games. Gamification is about trying to use ...
Read More Lies, Damned Lies, and Cybersecurity Statistics
cybersecurity, cybsrecuritystatistics, gamification, ThreatGEN® Red vs. Blue
|Either Mark Twain or the 19th century British Prime Minister Benjamin Disraeli said, "There are three kinds of lies: lies, damned lies, and cybersecurity statistics." There are three kinds of lies: lies, damned lies, and statistics."Mark Twain Quotes." Quotes.net. STANDS4 LLC, 2021. Web. 21 Jan. 2021. <https://www.quotes.net/quote/1647>. Parody aside, in the cybersecurity ...
Read More OT/ICS Cybersecurity Kill Chain video released
kill chain, Pascal Ackerman, Red vs. Blue
|Sugar Land, Texas (July 2, 2020) — ThreatGEN, an operational technology (OT) security firm, releases its second video in its Red vs. Blue Academy OT security educational series entitled "OT/ICS Cybersecurity Kill Chain, Technical Demo". In this video, Pascal Ackerman demonstrates an OT/ICS cybersecurity attack on a control system, from ...
Read More Checking for ICS Internet Exposure Using Shodan.io
ICS, Shodan.io
|In this article I will take you through the process of performing an internet exposure check for your ICS. We will look at what “exposure” means in the realm of networking, followed by a sample search for the internet exposure of a random IP address that I chose for no ...
Read More Design for Security – Why Proper Architecture Matters to ICS Security
architecture, cybersecurity, ICS, ThreatGEN
|I wanted to take some time today and share with you my thoughts on fundamental ICS (cyber)security. With all these shiny new and valuable OT aimed security products being in the past few years, it might be tempting to start thinking that securing your industrial environment will be achievable with ...
Read More Taking a closer look at the LookBack Malware Campaign
cybersecurity, ICS, malware, malware campaign
|If you follow my posts on LinkedIn, you might recall an article I shared about a week or two ago about a new malware campaign that was uncovered, targeting ICS companies in the US utilities industry. If you missed the post or want to reread the article, here is the ...
Read More Another day, more data breaches – where the data goes
cybersecurity, data breach, ICS
|This is my first blog post as principal threat analyst with ThreatGEN. The intent is to release a somewhat weekly security news aggregate article with a preference for Industrial security threat articles and a strong technical emphasis on things. Well, I will start that ritual next week, because this week ...
Read More