Blog

IP Reputation Report-01192020

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 19, 2020. (mais…)

ICS Information Security Assurance Framework 6

2.2 ICS-Targeting Malware Analysis In recent years, more and more malware took ICSs as targets, causing an increasingly great damage. The following sections analyze major ICS-targeting malware. (mais…)

ICS Information Security Assurance Framework 5

Typical ICS Security Incidents As ICSs are increasingly informatized and open, more and more attacks are hitting ICSs, doing an increasing harm. ICS-targeted attacks use the IT network as a springboard to affect the operating of OT systems. Currently, attacks against ICSs are carried out to achieve three purposes: disrupting...

ICS Information Security Assurance Framework 4

Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs' original security protection systems which feature border separation and protection tend to be associated and integrated...

ICS Information Security Assurance Framework 3

Development of ICS Information Security Since the Stuxnet virus explosion, countries all over the world have taken ICS security issues to a new height by actively working out and introducing related policies, standards, technologies, and solutions. A look into ICS security developments around the world reveals that the USA is...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.