Author: Waterfall Team

It's better to have logs and not need them, than to need logs and not have them. And the same applies to dual-logs. With dual-logs, cyber attackers are putting themselves in danger and revealing their intentions every time they wipe their events from the log.

Modern cars contain many CPUs and ECUs that are all connected and controlled using CANbus networks. Our guest on the show, Dr. Ken Tindell, explains how car thieves have been able to exploit vulnerabilities within CANbus networks to disable the immobilizer and unlock the vehicle, as well as how car

Rees Machtemes and Andrew Ginter walk us through the latest trends and recent incidents of the cyber threat environment faced by water utilities, and take a look at the new EPA's audit advice along with the challenges it presents for OT water systems, as well as how to solve those issues with Engin

Atlantic Data Security and Waterfall Security Solutions announce a strategic partnership to strengthen industrial cybersecurity in many industries. This collaboration provides ADS customers with secure and consolidated IT/OT integration technology that safeguards against both current and future cybe