A Tale of Two Lines

Change is part of daily industrial operations. Detecting a change and assessing the validity of that change are critical to effective ICS cybersecurity. Let’s say, for instance, that two lines have been removed from an SIS configuration file. Now let’s say this change blinds the operator to the availability of the SIS.How will you know this configuration change occurred? This particular change happens deep... Read more