The Radiflow Cyber Security Blog


Subscribe to the Radiflow Security Blog – new posts will conveniently show up in your inbox the day they’re posted.

Seeing is Believing: Live Demonstration of OT Cyber Attacks

By Gilad Bandel, VP Products, Radiflow Real-life live demonstrations of cyber-attacks scenarios are the best way to educate and create awareness of the potential risks and damages to ICS/SCADA systems, using various attack vectors. Such a demonstration was held at the...

read more

The headache caused by protecting unmanned distributed sites

In recent years, the awareness for securing industrial control systems (ICS) has greatly increased. Since around 2014, many companies have started implementing cyber security solutions to protect their ICS networks from potential cyber incidents. In most companies,...

read more

Are Schools Ready for Cyber Attacks?

When parents send their children to school, they believe that the school will educate them, teach them manners, and prepare them for the real life. But before the teaching starts, both kids and parents should have confidence in the school environment, the quality of...

read more

Detection of unauthorized changes in the PLCs’ logic

The Deep-Packet-Inspection (DPI) protocol for industrial network traffic is one of the fundamental technologies currently used in protecting ICS networks. Using this technology, security products are able to accurately identify the industrial commands and parameters...

read more

Calculating the Cost of a Power Outage

What is the cost of a power outage caused by a cyber-attack? And how does one calculate the predicted cost? Beyond the actuary purpose of estimating the cost of a power outage caused by a cyber-attack, the predicted cost can also inform decision makers as to the...

read more

Analysis of the Ukrainian Outage

As the smoke starts to clear around the Ukrainian power outage–a significant case of a confirmed cyber-attack that left tens of thousands of people in the dark–more and more details are being confirmed about the chain of events that led to the outage. In this paper we...

read more