Research

Risk & Reward: Reconciling the conflicted views of business leaders on the value of cybersecurity

These are challenging times to run a business. High inflation, surging energy prices and rising interest rates in much of the world are taking their toll on many enterprises, their partners and their customers. Annual growth in advanced economies is predicted to be just 1.2% in 2023. In some cases, it will fall even lower […]

Risk & Reward: Reconciling the conflicted views of business leaders on the value of cybersecurity Read More »

Evil PLC Attack: Weaponizing PLCs

Programmable logic controllers (PLCs) are indispensable industrial devices that control manufacturing processes in every critical infrastructure sector. Because of their position within automation, threat actors covet access to PLCs; several industrial control system malware strains, from Stuxnet to Incontroller/Pipedream, have targeted PLCs. But what if the PLC wasn’t the prey, and instead was the predator?

Evil PLC Attack: Weaponizing PLCs Read More »

More Training, Better Prepared: Increasing the Frequency of Training Improves Understanding of Security Instructions

Research has been conflicted with regards to how often security awareness training needs to be undertaken in order to effectively implement changes in behaviors and knowledge (Stewart et al, 2012; Pattinson et al, 2017, Gundu er al, 2019). In this report we examine how clearly security instructions are understood by employees relative to the amount

More Training, Better Prepared: Increasing the Frequency of Training Improves Understanding of Security Instructions Read More »

The Cyber Priority

The Cyber Priority explores the state of cyber security in today’s global energy sector, investigating executives’ understanding of the cyber risks their businesses face and their strategies for managing the evolving threat. The research draws on a survey of 948 energy professionals and a series of in-depth interviews with industry leaders and security experts. It

The Cyber Priority Read More »

Operational technology cybersecurity risk significantly underestimated

Key Findings Organizations with OT environments underestimate the risk of a cyberattack Fifty-six percent of all respondents are highly confident that their organization will not experience an OT breach in the next year, yet 83% said they had at least one OT security breach in the prior 36 months. Seventy-one percent of utilities respondents are

Operational technology cybersecurity risk significantly underestimated Read More »

Inside the mind of the CISO 2021

The definitive study on what makes outstanding thought leadership in the cyber industry Introduction Cyber marketing specialists face the constant challenge to contribute to the bottom line. Indeed, it is the reason for their existence. Whether start-up, scale-up or enterprise marketing specialists have to develop a broad array of tactics, optimising budgets against each stage

Inside the mind of the CISO 2021 Read More »

Don’t get left behind: an enterprise view of the low-code automation landscape

Enterprises are facing enormous challenges and opportunities created by new streams of data and ever-expanding possibilities for customer engagement. To meet increased demand, reduce inefficiencies, and quickly deploy digital solutions, businesses are turning to intelligent automation. Intelligent automation powers a seamless Center-out™ method for connecting operational processes with customer experiences. Using case management as the

Don’t get left behind: an enterprise view of the low-code automation landscape Read More »