Resource Center
Filter
SBOMS
AI
Handbook
Webinar
Video
Zero trust for OT
IoT/IIoT
IT/OT
Product, Solutions & Services
Market Updates
Industry Focus
Threats and vulnerabilities
Vendor
Govt & Regulations
Guides & frameworks
Clear Filters
Govt & Regulations
Cybersecurity Reciprocity Playbook (US DoD)
The DoD Cybersecurity Reciprocity Playbook is designed to provide clear, credible information on key Department priorities for employing cybersecurity reciprocity in DoD systems, consistent with DoD Instruction (DoDI) 8510.01, “Risk Management Framework for DoD Systems”
Govt & Regulations
Guidance for Organisations Considering Ransomware Payments (NCSC UK)
This guidance, developed by ABI, BIBA, IUA, and NCSC, is for organisations facing ransomware attacks and their partners. It aims to reduce business disruption and costs, the number of ransoms paid by UK victims, and the size of ransoms when payment is chosen.
Govt & Regulations
Encrypted DNS Implementation Guidance (CISA)
This document is intended to provide implementation guidance for federal agencies to meet federal requirements related to encryption DNS traffic and enhance the cybersecurity posture of their IT networks, as set forth in OMB Memorandum M-22-09.1 The Memorandum sets forth a “zero trust” cybersecurity strategy for FCEB agencies.
Guides & frameworks
PAS (Hexagon PPM)
WALLIX
Darktrace
The Definitive Industrial Cyber Critical Infrastructure Handbook
The "Critical Infrastructure Industrial Cybersecurity Handbook" provides essential guidance on protecting the indispensable systems that support modern society—spanning energy, healthcare, transportation, and communications sectors. These infrastructures are not only crucial for economic and public welfare but are also integral to national security. This handbook addresses these challenges by outlining strategies for securing infrastructure, managing legacy systems, and enhancing resilience against cyber threats.
Govt & Regulations
Secure-by-Design (cyber.gov.au)
Choosing secure and verifiable technologies. Customers have the responsibility for evaluating the suitability, security and risks associated with acquiring and operating a digital product or service. However, it is important that customers increasingly demand manufacturers embrace and provide products and services that are secure-by-design and secure-by-default.
Govt & Regulations
National Cybersecurity Strategy Implementation Plan (V2)
This is the second iteration of the NCSIP, building upon the first version released in July 2023. The NCSIP Version 2 describes 100 high-impact initiatives requiring executive visibility and interagency coordination that the Federal Government is pursuing to achieve the Strategy’s objectives. These initiatives carry over from, add to, and build upon the initiatives described in the first NCSIP, and advance the nation closer toward the Strategic Objectives sought in the National Cybersecurity Strategy.
Threats and vulnerabilities
Forescout
Exposing the Exploited – Analysis of vulnerabilities under the radar (Forescout)
The process for naming security vulnerabilities is flawed, with many issues overlooked. Some vendors discreetly fix problems, while others do not address them at all, leading to no comprehensive source of information on all exploited vulnerabilities. This causes delays and reduces security team effectiveness. Our research provides insights into vulnerabilities exploited beyond standard catalogs, highlighting the real-world landscape of security threats.
Vendor
Invictux
OT Penetration Testing – Invictux
Invictux offers comprehensive OT penetration testing services to identify and address vulnerabilities within operational technology environments, enhancing their resilience against cyber threats.
Vendor
Invictux
OT Risk Assessment – Invictux
Invictux offers Gap/Compliance Assessments to identify potential cybersecurity threats, followed by Vulnerability Assessments to pinpoint weaknesses. Subsequently, our Risk Assessment services evaluate the level of risk, prioritizing mitigation efforts. Finally, we provide Penetration Testing to ensure the resilience of operational technology environments.