The Radiflow Cyber-Security Blog

Subscribe to the Radiflow Security Blog – new posts will conveniently show up in your inbox the day they’re posted.
Who Moved My Firmware?

Who Moved My Firmware?

The Radiflow Security BlogThe management of firmware risks in industrial facilities takes place on four levels: Within the supply chain During the facility’s initial commissioning During regular operations and as part of facility upgrades and expansions Radiflow’s...

read more
How Dangerous is my ICS Vulnerability? Depends Who You Ask

How Dangerous is my ICS Vulnerability? Depends Who You Ask

The Radiflow Security Blog What to do when ICS-CERT and NIST produce contradictory vulnerability analyses  Synopsis  Vulnerability disclosure organizations are considered to be the most important and reliable source of actionable information for vulnerability and risk...

read more
Seeing is Believing: Live Demonstration of OT Cyber Attacks

Seeing is Believing: Live Demonstration of OT Cyber Attacks

By Gilad Bandel, VP Products, Radiflow Real-life live demonstrations of cyber-attacks scenarios are the best way to educate and create awareness of the potential risks and damages to ICS/SCADA systems, using various attack vectors. Such a demonstration was held at the...

read more
The headache caused by protecting unmanned distributed sites

The headache caused by protecting unmanned distributed sites

In recent years, the awareness for securing industrial control systems (ICS) has greatly increased. Since around 2014, many companies have started implementing cyber security solutions to protect their ICS networks from potential cyber incidents. In most companies,...

read more