CONTACT US WITH SUSPICIOUS ACTIVITY | 832-493-1153

NEWS

ICS/OT Security

Insider Threats in the ICS Environment

Most people think of State level actors when they think of threats to ICS networks. China, Russia, and others certainly represent threats to America’s critical infrastructure and any type of operational networks that you may be operating, but they aren’t necessarily the biggest threat to you.

LEARN MORE
ICS/OT Security

Why ICS Security Hasn’t Matured Fast Enough

IT Security has matured rapidly over the past decade in order to counter escalating threats, but this level of rapid maturation hasn’t been matched in the ICS Security arena, and there are 5 basic reasons why.

LEARN MORE
Cyber Security

An Operational Perspective of OT Security

Convergence of physical and cyber has been a pop-up topic for many years, but not a lot of rigor has been put into looking at the problem academically and practically.

LEARN MORE
RTAS

Improving Access to Power Distribution and Substations

Remote access and work–from–home solutions present unique challenges for power generation plants and substations controlled by ICS/SCADA networks. The threat from COVID-19 has changed the way that we work and is forcing many organizations to look for new ways for their operators and engineers to access their networks.

LEARN MORE
RTAS

Improving Access to Water and Waste Water ICS/SCADA Systems

Water and waste-water treatment plants are unique environments with challenging ICS and SCADA network requirements. The threat from COVID-19 has prompted many plant operators to consider expanding remote access into their environments.

LEARN MORE
RTAS

RTAS – Red Trident Access Solution

Today, more than ever before, automation teams are faced with reality that remote access into your ICS system is required. Due to the outbreak of Coronavirus (COVID-19) the automated industry that we have all grown to love is facing a real issue.

LEARN MORE
Iranian Cyber Threats

Iranian Hacker Threat – Is it real? Part 4

Over the past few days, we have looked at 3 very different Iranian hacker groups that operated in very different ways. We have had some great conversations with our clients and partners about the different ways that we can all protect ourselves from these threats.

LEARN MORE
Iranian Cyber Threats

Mid-sized companies with IT and ICS networks CAN protect themselves from Iranian based hackers, Part 3

So far, we have looked at 2 very different Iranian hacker groups that operated in very different ways. Today, we are continuing our quick overview of the most likely Iranian hacker threats that you may face in the next few weeks.

LEARN MORE
Iranian Cyber Threats

Mid-sized companies with IT and ICS networks CAN protect themselves from Iranian based hackers, Part 2

Today, we are continuing our quick overview of the most likely threats that you will face if the Iranian hacker groups decide to target your organization in the next few weeks.

LEARN MORE

We're ready to deploy your strategy

Contact us for a briefing of your facility's needs

832.493.1153
sales@redtridentinc.com | support@redtridentinc.com
904 Gemini Ave, Houston, TX 77058

© 2020 Red Trident. All Rights Reserved.

Scroll to Top