toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

234
active users

#OperationalTechnology

0 posts0 participants0 posts today
Pyrzout :vm:<p>Unsophisticated Hackers Targeting ICS/SCADA Systems: CISA <a href="https://thecyberexpress.com/hackers-targeting-ics-scada-systems/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/hackers-ta</span><span class="invisible">rgeting-ics-scada-systems/</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://social.skynetcloud.site/tags/energysectorthreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>energysectorthreats</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/CISAICSadvisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISAICSadvisory</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/SCADAsystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCADAsystems</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a></p>
Pen Test Partners<p>The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…<br>&nbsp;<br>OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.<br>&nbsp;<br>By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.<br>&nbsp;<br>In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: <a href="https://www.pentestpartners.com/security-blog/ics-testing-best-results-hint-blend-your-approach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/ics-testing-best-results-hint-blend-your-approach/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/icsmonitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icsmonitoring</span></a> <a href="https://infosec.exchange/tags/industrialsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialsecurity</span></a> <a href="https://infosec.exchange/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/cyberawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberawareness</span></a></p>
ADMIN magazine<p>Principles of Operational Technology Cyber Security released by NSA, Australian Signals Directorate, CISA, and other government organizations<br><a href="https://www.admin-magazine.com/News/Six-Principles-of-Operational-Technology-Cybersecurity-Released" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/Six-Pr</span><span class="invisible">inciples-of-Operational-Technology-Cybersecurity-Released</span></a><br><a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hachyderm.io/tags/infrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infrastructure</span></a> <a href="https://hachyderm.io/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://hachyderm.io/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://hachyderm.io/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> <a href="https://hachyderm.io/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://hachyderm.io/tags/SuppyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SuppyChain</span></a></p>
BreakingBadness<p>Did you miss last week's podcast with <span class="h-card" translate="no"><a href="https://infosec.exchange/@dragosinc" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dragosinc</span></a></span>'s <span class="h-card" translate="no"><a href="https://infosec.exchange/@hacks4pancakes" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hacks4pancakes</span></a></span>? In this episode of the Breaking Badness Cybersecurity Podcast, Lesley joins <span class="h-card" translate="no"><a href="https://infosec.exchange/@NotTheLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>NotTheLinux</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@danonsecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>danonsecurity</span></a></span> to share insights on OT challenges, incident response, and bridging the gap between cyber and operations. Don’t miss out on this enlightening discussion! 🎙️</p><p>🎧 Listen here: <a href="https://www.domaintools.com/resources/podcasts/industrial-cybersecurity-explained-with-lesley-carhart/?utm_source=Social&amp;utm_medium=Mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">domaintools.com/resources/podc</span><span class="invisible">asts/industrial-cybersecurity-explained-with-lesley-carhart/?utm_source=Social&amp;utm_medium=Mastodon</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/CyberPodcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberPodcast</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://infosec.exchange/tags/OperationalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalSecurity</span></a></p>
Claudius Link<p>Question <a href="https://infosec.exchange/tags/BoostWelcome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BoostWelcome</span></a></p><p><a href="https://infosec.exchange/tags/5g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5g</span></a> for <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a>/ <a href="https://infosec.exchange/tags/Manufacturing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Manufacturing</span></a> is a big topic. And i don't (completely?) get it 🤔</p><p>I find it hard to separate the marketing blah (basically 5g solves everything) from real information. </p><p>One thing i understand, 5g brings low latency and high throughout ✅</p><p>But, the first question I can't find definite information on: <br>Are we talking about private 5g networks or is it using the standard 5g networks by the mobile providers? </p><p>And depending on the answer, there are a lot of follow up questions</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/fedipower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedipower</span></a> <a href="https://infosec.exchange/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
ITSEC News<p>Spotlight Podcast: OT Is Under Attack. Now What? - Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat la... <a href="https://feeds.feedblitz.com/~/898958480/0/thesecurityledger~Spotlight-Podcast-OT-Is-Under-Attack-Now-What/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feeds.feedblitz.com/~/89895848</span><span class="invisible">0/0/thesecurityledger~Spotlight-Podcast-OT-Is-Under-Attack-Now-What/</span></a> <a href="https://schleuss.online/tags/industrialcontrolsystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialcontrolsystems</span></a>(ics) <a href="https://schleuss.online/tags/operationaltechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnologies</span></a> <a href="https://schleuss.online/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://schleuss.online/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://schleuss.online/tags/operationalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationalsecurity</span></a> <a href="https://schleuss.online/tags/internetofthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetofthings</span></a> <a href="https://schleuss.online/tags/directdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>directdefense</span></a> <a href="https://schleuss.online/tags/rsaconference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsaconference</span></a> <a href="https://schleuss.online/tags/technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technologies</span></a> <a href="https://schleuss.online/tags/cisocloseup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisocloseup</span></a> <a href="https://schleuss.online/tags/conferences" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conferences</span></a> <a href="https://schleuss.online/tags/volttyphoon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>volttyphoon</span></a> <a href="https://schleuss.online/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://schleuss.online/tags/topstories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>topstories</span></a></p>
ITSEC News<p>Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk - In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of ... <a href="https://feeds.feedblitz.com/~/896707298/0/thesecurityledger~Spotlight-Podcast-CSO-Chris-Walcutt-on-Managing-rd-Party-OT-Risk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feeds.feedblitz.com/~/89670729</span><span class="invisible">8/0/thesecurityledger~Spotlight-Podcast-CSO-Chris-Walcutt-on-Managing-rd-Party-OT-Risk/</span></a> <a href="https://schleuss.online/tags/operationaltechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnologies</span></a> <a href="https://schleuss.online/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://schleuss.online/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/internetofthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetofthings</span></a> <a href="https://schleuss.online/tags/directdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>directdefense</span></a> <a href="https://schleuss.online/tags/technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technologies</span></a> <a href="https://schleuss.online/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://schleuss.online/tags/topstories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>topstories</span></a> <a href="https://schleuss.online/tags/companies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>companies</span></a> <a href="https://schleuss.online/tags/spotlight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spotlight</span></a> <a href="https://schleuss.online/tags/interview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interview</span></a> <a href="https://schleuss.online/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://schleuss.online/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a></p>