Preview Mode Links will not work in preview mode

Unsolicited Response Podcast

May 15, 2024

Chris Hughes and Nikki Robinson recently wrote the book Effective Vulnerability Management. Dale and Chris discuss the topic and book including:

  • The definition and scope of vulnerabilities. It’s much more than coding errors that need patches.

  • Are ICS protocols lacking authentication “vulnerabilities”

  • The...

May 3, 2024

Waterfall Security Solutions and ICSSTRIVE put out an annual threat report that Dale Peterson believes is the best in OT. Why? It only includes incidents that had physical consequences on systems monitored and controlled by OT. 

Dale and Andrew discuss:

  • What is in and out of scope for the report.

  • The breakdown of...