Waterfall Security Solutions
FireEye president Travis Reese joins Waterfall Security board of directors
Waterfall Security Solutions unveiled that cyber security veteran and industry leader Travis Reese is joining Waterfall’s board of directors. Mr. Reese is currently the …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
Strategies for expertly protecting industrial control systems
Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101945/industry-400x200.jpeg)
Best practice methodology for industrial network security: SEC-OT
Secure Operations Technology (SEC-OT) is a methodology and collection of best practices inspired by a decade of experience working with secure industrial sites. The SEC-OT …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095907/industry-mirror-400x200.jpg)
Many water and energy systems vulnerable to significant cyber risk
New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095910/industry-lock-400x200.jpg)
Safeguarding global critical networks now and in the future
Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions …
Unidirectional Security Gateways provide safe IT/OT integration to Chinese industry
Waterfall’s flagship products were awarded China Compulsory Product Certification (CCC). The CCC Mark is essential for any manufacturer selling to Chinese manufacturers, …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100455/industry-400x200.jpg)
The risk to OT networks is real, and it’s dangerous for business leaders to ignore
Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
The future of OT security in modern industrial operations
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. In this podcast, Andrew Ginter, VP of Industrial …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
Safe IT/OT integration with unidirectional security gateways
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100109/industrial-400x200.jpg)
Vulnerabilities and architectural considerations in industrial control systems
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100205/industry-1-400x200.jpg)
Malicious hacking activity increasingly targeting critical infrastructure
In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100245/industry-400x200.jpg)
A closer look at the IT/OT landscape for infosec professionals
The challenge for modern cyber security engineers working in the OT/ICS area involves modernizing the weak or missing protection controls in existing infrastructure toward …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD