Five steps to assess the security of your industrial control system

Five steps to assess the security of your industrial control system

The Radiflow Security Blog Five steps to assess the security of your industrial control system Based on the extent of cyber attacks on organizations that employ Industrial Control Systems (ICS), it should be assumed that there’s a good chance someone will try to hack...
The headache caused by protecting unmanned distributed sites

The headache caused by protecting unmanned distributed sites

In recent years, the awareness for securing industrial control systems (ICS) has greatly increased. Since around 2014, many companies have started implementing cyber security solutions to protect their ICS networks from potential cyber incidents. In most companies,...
Are Schools Ready for Cyber Attacks?

Are Schools Ready for Cyber Attacks?

When parents send their children to school, they believe that the school will educate them, teach them manners, and prepare them for the real life. But before the teaching starts, both kids and parents should have confidence in the school environment, the quality of...
Detection of unauthorized changes in the PLCs’ logic

Detection of unauthorized changes in the PLCs’ logic

The Deep-Packet-Inspection (DPI) protocol for industrial network traffic is one of the fundamental technologies currently used in protecting ICS networks. Using this technology, security products are able to accurately identify the industrial commands and parameters...
Calculating the Cost of a Power Outage

Calculating the Cost of a Power Outage

The Radiflow Security Blog Calculating the Cost of a Power Outage By Rani Kahat, VP Business Development, Radiflow What is the cost of a power outage caused by a cyber-attack? And how does one calculate the predicted cost?Beyond the actuary purpose of estimating the...