What is ICS4ICS?
Megan Samford discusses her work on ICS4ICS, improving ICS' emergency response effort and its possible presence in the field of cybersecurity.
Read MoreMegan Samford discusses her work on ICS4ICS, improving ICS' emergency response effort and its possible presence in the field of cybersecurity.
Read MoreIn this interview, Megan Samford explains how her background in emergency management influences her approach to cybersecurity in a critical industry.
Read MoreAutomated cyberattacks have certain behaviours in common. And you can use those behaviours to identify attacks and stop them from spreading.
Read MoreWhy is cybersecurity for disruptive tech more complicated? It’s got a lot to do with disruptive tech being new tech. Learn more from Majid Malaika (Chief Advisor to H.E. The Vice Governor of SAMA).
Read MoreWelcome to the new 56 cyber warriors who joined us last week. 🥳 Each week, we'll be sharing insights
Read MoreWesam Alzahir used a reverse engineering process to identify vulnerabilities in thermal printers – and it shows us how useful reverse engineering is to give companies a more complete understanding of their attack surface.
Read More