Introduction to ICS Security – Part 2
Discover how to overcome key challenges in ICS cybersecurity as we dive into the Purdue Enterprise Reference Architecture (PERA), and best practices for securing OT environments in our latest installment of the Introduction to ICS Cybersecurity blog series – a collaboration between iON and the SANS Institute.
Written by iON’s Stephen Mathezer, Certified SANS instructor with assistance from Jordan Coldham.
You might also like
The Log4Shell Zero-Day Exploit: A Quick Review
What a start to the holidays…If you’re a Network Admin or a CISO, chances are you’ve already put in several hours dealing with the Log4Shell vulnerability. For anybody looking to get a quick overview of what this vulnerability is about and how to protect against it, please read on!Where Did This Come From and Who…
The Benefits of Penetration Testing – Putting Your Cybersecurity Practice Through its Paces
For many organizations, conducting penetration tests on their systems is looked on strictly as a means of complying with industry regulations. Others consider pen tests an expensive exercise that provides little value because they don’t perceive themselves as likely targets of cyberattacks or they simply don’t see the need for somebody else to evaluate their…
Helping Where We Can – iON Donates $10,000 to Two Vital Charities This Holiday Season
Community involvement has been an important part of the iON Code since Day One, and in light of the unique difficulties currently facing many Canadians, we are pleased to announce two charity donations we’ll be making in the coming days. First, we will be topping up the $1,500 contribution to Food Banks Canada announced at our annual Customer Appreciation Holiday Party in Calgary to the sum of…