• Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted as well as three pillars for securing industrial networks
  • Industrial Processes Move to the Cloud
  • 3 Keys to Securing Converged IT/OT Environments
  • ICS SCADA With Secure Clouds
  • Choosing the Right Pricing Model for Equipment as a Service
  • Scalable, Current, Real-Time SCADA in the Cloud
  • Data analytics for network intrusion detection
  • Industrial network security best practice advice
  • Data flow is no longer hierarchical
  • IT-OT collaboration needs context and increased visibility –
  • Trends for Industry 4.0 in 2020 and Beyond
  • The IoT Really Does Work in the Factory
  • ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks?
  • Managing risk in today’s IoT landscape: not a one-and-done
  • Introduce analytics best practices into industrial environments
  • A Cloud Based Alternative to Traditional SCADA
  • SCADA: Alive and Well in the Age of IoT
  • Artificial Intelligence Arrives at the Edge
  • Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
  • Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
  • Compliance as a Way to Reduce the Risk of Insider Threats
  • SCADA vulnerabilities in ICS architectures
  • Cybersecurity Capability Maturity Model (C2M2) Program
  • Emerson Brings Cloud-Based SCADA Into Its Field
  • Embracing Industry 4.0 and Rediscovering Growth
  • Research Library Updates
  • Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
  • SEC Industrial Security Intelligence Data Platform 2019 Document
  • SEC Highlighted Research Reports – Jan 07
  • PTC: The State of Industrial Augmented Reality
  • 7 Habits of Highly Successful Competitive Intelligence Analysts
  • Top 5 Competitive Intelligence Deliverables to Drive your Project Forward
  • Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
  • SEC Threat Intelligence as a Critical Organizational Need – SEC Report
  • SEC Conferences
  • 7 Practical Steps to Get Started with Security Intelligence
  • SEC Security Data Services – SEC Report
  • What Is Threat Intelligence? Definition and Examples
  • Building a Threat Intelligence Framework to Defend Against Cyberattacks
  • Threat Intelligence’s Big Data Problem
  • Finding The ROI Of Threat Intelligence: 5 Steps
  • 6 Surprising Benefits of Threat Intelligence From the Web
  • Threat Intelligence, Information, and Data: What Is the Difference?
  • SEC Security Report October 2017
  • SEC Security Report September 2017
  • SEC Automation: Choosing the Right Systems Integrator for your Automation Project
  • SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
  • SEC Asset Discovery: Automated Asset Discovery in Industrial Control Systems – Exploring the Problem
  • Flexera Software Country Reports: United States: United Kingdom: Nordics: France: Benelux: DACH: APAC
  • Deloitte: SEC Cyber Risk – Examining the Industrial Control System Cyber Risk Gap
  • MGS+ ICS Security Report August 2017
  • Center for Internet Security MS-ISAC Alert Level
  • Digital Attack Map Top Daily DDoS attacks worldwide
  • Cybermap Kaspersky
  • MGS+ ICS Security Report July 2017
  • Competitive Intelligence – CI For Beginners Part 2: Engaging the Process
  • Competitive Intelligence – CI For Beginners Part 1: Insight Work
  • SEC Intelligence Platform – Version 2.0 Release
  • MGS+ ICS Security Report June 2017
  • Threat Intelligence could turn the tide against cybercriminals
  • MGS+ ICS Security Report May 2017
  • MGS+ ICS Security Report April 2017
  • How Do Security Intelligence Solutions Differ from First-Gen SIEM Products
  • MGS+ ICS Security Report March 2017
  • What Is Security Intelligence and Why Does It Matter Today?
  • Six Things You Always Wanted to Know about Security Intelligence but Were Afraid to Ask
  • How Quickly Can You Realize ROI on Your Security Intelligence Deployment?
  • The Definition of Security Intelligence
  • What Are the Benefits of Security Intelligence?