Industrial Automation and Control Systems (IACS) Security
ICS/SCADA Security Assessment & Penetration Testing
Risk and Vulnerability Assessment (RVA)
Embedded Security Assessment
Medical Devices Security Assessment
IoT Security Assurance Services
Vulnerability Disclosure Policy
ICS Cyber Security Awareness Training
Advanced ICS/SCADA Hacking Training
In the Press
The Need to Address the Cyber Security of Level 1 Devices
Security Safeguard: Defend and Protect Your Crown Jewels Against Cyber Threats
Security Development Lifecycle (SDL) for ICS/SCADA Systems
Is your business prioritising the security of industrial assets?
Industrial Control Systems (ICS) Hardware Hacking
ISA 62443-4-1 Standards - Secure Development Lifecycle (SDLC) Requirements
Creating cyber security culture in Operational Technology (OT)
Establishing a Comprehensive ICS Security Framework
Industrial Internet Emerging Security Challenges
Multiple Vulnerabilities in MOXA ioLogik E1200 Series
The NSA Hack and New Zero-Day Vulnerabilities: What Does It Mean For Your OT Infrastructure?
IEC 61850: Are Your Substations Secure?
Things You Need To Know About IEC 62443 Standards
Ransomware : Are Industrial Environments leaving Pandora’s Box wide open?
How To Protect Your ICS/SCADA Against “WANNACRY” Ransomware?
The Impact of Petya Ransomware on Industrial Control Systems
Securing Industrial Control Systems Through Design
VSAT insecurity: a wake-up call for the maritime industry
A target in the crosshairs – how should the energy sector respond to Dragonfly?
Preventing the healthcare security headache
Cybersecurity legislation in the EU – What is the NIS Directive?
How will Meltdown and Spectre impact industrial environments?
Keeping industrial facilities safe – the importance of network segregation
Securing the Industrial Internet of Things (IIoT)
Understanding the Importance of Physical Security for Industrial Control Systems (ICS)
Is the security of your maritime systems above board?
Convenience Vs. Security – Are smart cars going down a dangerous road?
Are Insecure Medical Devices Eroding Patient Safety and Security?
Future cyber security regulations: Are you ready for what's coming?
Ensuring Secure Deployment of Industrial Wireless Systems
Counting Your Cards: The Importance of ICS Asset Identification
The Need For A Shift In Focus To Automotive Cybersecurity
Don’t throw away the keys to your smart building – make cybersecurity a priority
Smarter Ships, Smarter Security: Securing Operations At Sea
The Insecurity of Power Facilities: How Secure is Your Power Grid?
Don’t Let Poor Security Leave A Bad Taste: Securing Food & Beverage Manufacturing Facilities
In the Press
EU NIS Directive vraagt om actie
July 2, 2018
Security must be top of the manufacturing agenda
August 26, 2016
Singapore to shut off internet access for government agencies
August 24, 2016
SFG malware discovered in European energy company
July 13, 2016
Control system security compliance: Assess risk before it’s too late
June 28, 2016
In cybersecurity bij meerderheid in de processindustrie niet op orde
June 9, 2016
The growing threat of cyber attacks on critical infrastructure
May 18, 2016
PLC Worms Can Pose Serious Threat to Industrial Networks
May 9, 2016
The IoT brings industry revolution and risk at the same time
April 22, 2016
Applied Risk featured in article on securing the digital hinterland
April 7, 2016
Fourth Industrial Revolution Beckons, but Business and Engineering Communities Must Learn to Talk
March 1, 2016
Vulnerabilities discovered in automation and control systems
February 5, 2016
WirelessHART Flaws Found: Researchers
February 3, 2016
ICS Security Firm Warns of Flaws in WirelessHART Devices
February 2, 2016
Applied Risk reveals weaknesses in WirelessHART products
February 1, 2016
WirelessHART industrial control kit is riddled with security holes
February 1, 2016