- BlackEnergy malware used in Ukraine power grid attacks
- 11 components of an ICS/SCADA cybersecurity strategy
- Why Are Companies & Their Directors & Officers Still Behind on #Cybersecurity Oversight and Disclosure?
- Unnecessary Risks: Vulnerabilities in ICS Devices
- Top 10 technology challenges for IT audit professionals
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating,
and Transforming Your Cybersecurity Program