Who's Smarter, Hackers or Defenders?

I am sometimes befuddled at just how much press (negative and otherwise) hackers receive. Truth be told, perhaps my befuddlement contains just a twinge of jealousy (okay, maybe more than a twinge). Although hackers may not have attained the status of rock stars yet, I...

Beyond AIC: Tom Clancy’s take on cyber-physical attacks

Too often, discussions on cyber-physical attack scenarios and how to prevent them are focused on the idea that a cyber attacker could disrupt or freeze process control, thereby causing downtime. This thinking is in alignment with the common misconception that...

IT vs. ICS: An Attacker's Perspective

There are extensive treatments of the similarities and differences between information technology (IT) systems and industrial control systems (ICS), but these differences are more than just academic concerns. Many IT hacks as reported in the media seem to be...

Five Steps to Critical Penetration Analysis

Penetration tests (pentests) have gained recognition as a legitimate approach to identifying and then in theory, mitigating discovered weaknesses. The pentest industry even has a magazine (PenTest Magazine) and there are some tools out there that you, as an industrial...
RIPE brochure available for download

RIPE brochure available for download

Our new RIPE brochure, highlighting the characteristics and benefits of the RIPE Cyber Security and Robustness Program, is available for download (PDF): English language version German language...