Gamification vs. Games
games, gamification, training
|ThreatGEN’s Aaron Shbeeb delves into the differences between games and gamification as well as defining good gamification attributes.
Lies, Damned Lies, and Cybersecurity Statistics
cybersecurity, cybsrecuritystatistics, gamification, ThreatGEN® Red vs. Blue
|ThreatGEN brings together multiples sources for its list of cybersecurity statistics, their sources, and some of our own.
OT/ICS Cybersecurity Kill Chain video released
kill chain, Pascal Ackerman, Red vs. Blue
|In this video, Pascal Ackerman demonstrates an OT/ICS cybersecurity attack on a control system, from start to finish, through the entire ICS Cybersecurity Kill Chain. While this is an in-depth technical demo, no technical experience or knowledge is required to understand it.
Checking for ICS Internet Exposure Using Shodan.io
ICS, Shodan.io
|Pascal Ackerman takes the reader through the process of performing an internet exposure check for your ICS.
Design for Security – Why Proper Architecture Matters to ICS Security
architecture, cybersecurity, ICS, ThreatGEN
|Pascal Ackerman reviews some fundamental ICS Cybersecurity. A never ending battle in an ever changing landscape – start from the bottom up with a security-minded and security friendly design of the ICS network architecture.
Taking a closer look at the LookBack Malware Campaign
cybersecurity, ICS, malware, malware campaign
|Pascal Ackerman goes into more depth from a LinkedIn article on a new malware campaign that was uncovered, targeting ICS companies in the US utilities industry.
Another day, more data breaches – where the data goes
cybersecurity, data breach, ICS
|ThreatGEN welcomes Pascal Ackerman with his first article on our website as our principal threat analyst. Articles will ensue with a technical flare, especially the elephant in the room today – data breaches.
- « Previous
- 1
- 2