TLS Attack TLS Attacks This is a follow up article for another interesting topic which is titled as “Are TLS vulnerabilities considered critical for internal…
Tech
Are TLS vulnerabilities considered critical for internal network
Are TLS vulnerabilities considered critical for internal network? We will not go into what is TLS, how it works, why its important to security etc….
Real Life OT Security Incidents
Case 1: Colonial pipeline ransomware attack Location: Houston, Texas The Colonial Pipeline ransomware attack was one of the most significant attacks in 2021. The attack…
Introduction to OT Security
Operational Technology uses hardware and software to monitor and control physical processes, devices, and infrastructure. They use specialized protocols and software to interface with legacy…
Difference between OT and IoT
The term “operational technology” (OT) refers to a particular class of hardware and software whose function is to keep track of and manage the operation…
Difference between IT and OT
Information Technology- Information technology, or IT, is the study of how to use systems, primarily computers, and telecommunications, to carry out a variety of tasks,…