Zev Brodsky
Recent Posts
IBM QRadar SIEM Integration For Complete OT Visibility
CISOs and security teams face an uphill battle when it comes to detecting and mitigating ever more frequent and sophisticated cyber threats, especially in OT environments.
White House Pushes for Stronger Critical Infrastructure Security
In the wake of the different ransomware attacks on Colonial Pipeline, JBS Foods, Oldsmar Florida water system and other critical infrastructure, President Joe Biden signed a national security...
OT Networks Are the Low-Hanging Fruit for Supply Chain Attacks
When looking back at 2020 and 2021 the first thing that comes to mind is the different supply chain attacks on the industrial sectors. The successful attacks by threat actors exploited the industrial...
NERC Practice Guide: Helping Organizations Evaluate Network Monitoring Technologies
Earlier this month, on June 4th, the North American Electric Reliability Corporation (NERC) released a new practice guide that pinpoints how organizations should integrate network monitoring...
5 Key Takeaways from The U.S. Executive Order to Bolster Nation’s Cybersecurity
It’s no secret that Nation-State attackers are targeting US government agencies and organizations. As seen in the Solarwinds breach and the more recent Colonial Pipeline ransomware attack,...
Bridging the Gap Between IT & OT: How Rapid7 & SCADAfence Partnership Leads the Way
It's been over a decade since the headline-grabbing Stuxnet virus was introduced and the concept of nation-state-sanctioned cyber attacks was presented by security professionals. The concern about...
Colonial Pipeline Attack Spells Fuel Pipeline Shutdown: Increased OT Security Needed
On May 8th, news broke that Colonial Pipeline, one of the largest fuel pipelines in the US, was forced to stop all operations due to falling victim to a ransomware attack. The attack on Colonial...
Cyber Threats in the Pharma Industry: Johnson & Johnson Experiencing OT & IT Attacks
As each day passes, so does the increasing amount of security risks with the cybersecurity attack vector. Every organization can easily fall victim to another cyber threat, but recently, the...