<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: ICS Companies Are Worried About Cybersecurity, But Are They Worried About Right Things?</title>
	<atom:link href="http://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 13:58:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Mike johnson</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1723433</link>
		<dc:creator><![CDATA[Mike johnson]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 14:08:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1723433</guid>
		<description><![CDATA[The Distributed Denial of Service (DDoS) attack floods a computer server with traffic to try to take it offline

https://www.bbc.co.uk/bitesize/guides/z2c8wmn/revision/2]]></description>
		<content:encoded><![CDATA[<p>The Distributed Denial of Service (DDoS) attack floods a computer server with traffic to try to take it offline</p>
<p><a href="https://www.bbc.co.uk/bitesize/guides/z2c8wmn/revision/2" rel="nofollow">https://www.bbc.co.uk/bitesize/guides/z2c8wmn/revision/2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1676675</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 06:23:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1676675</guid>
		<description><![CDATA[Eight Common OT / Industrial Firewall Mistakes
https://threatpost.com/waterfall-eight-common-ot-industrial-firewall-mistakes/155061/
Firewalls are easy to misconfigure. While the security consequences of
such errors may be acceptable for some firewalls, the accumulated
risks of misconfigured firewalls in a defense-in-depth OT network
architecture are generally unacceptable. Most industrial sites deploy
firewalls as the first line of defense for their Operations Technology
(OT) / industrial networks. However, configuring and managing these
firewalls is a complex undertaking. Configuration and other mistakes
are easy to make. This article explores eight common mistakes that
firewall administrators make and describes how these mistakes can
compromise firewall functionality and network security. The lesson
here though is not &quot;stop making mistakes.&quot; This article also explores
unidirectional gateway technology as an alternative to our most
important OT firewalls. Unidirectional gateways provide physical
protection for industrial operations, rather than merely software
protection. This means that with a unidirectional gateway, no mistake
in configuration can impair the protection that the gateway provides
to the industrial network.]]></description>
		<content:encoded><![CDATA[<p>Eight Common OT / Industrial Firewall Mistakes<br />
<a href="https://threatpost.com/waterfall-eight-common-ot-industrial-firewall-mistakes/155061/" rel="nofollow">https://threatpost.com/waterfall-eight-common-ot-industrial-firewall-mistakes/155061/</a><br />
Firewalls are easy to misconfigure. While the security consequences of<br />
such errors may be acceptable for some firewalls, the accumulated<br />
risks of misconfigured firewalls in a defense-in-depth OT network<br />
architecture are generally unacceptable. Most industrial sites deploy<br />
firewalls as the first line of defense for their Operations Technology<br />
(OT) / industrial networks. However, configuring and managing these<br />
firewalls is a complex undertaking. Configuration and other mistakes<br />
are easy to make. This article explores eight common mistakes that<br />
firewall administrators make and describes how these mistakes can<br />
compromise firewall functionality and network security. The lesson<br />
here though is not &#8220;stop making mistakes.&#8221; This article also explores<br />
unidirectional gateway technology as an alternative to our most<br />
important OT firewalls. Unidirectional gateways provide physical<br />
protection for industrial operations, rather than merely software<br />
protection. This means that with a unidirectional gateway, no mistake<br />
in configuration can impair the protection that the gateway provides<br />
to the industrial network.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1646588</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 29 Jul 2019 17:32:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1646588</guid>
		<description><![CDATA[The Growing Threat of Drones
https://www.icscybersecurityconference.com/the-growing-threat-of-drones/

Drones Are Enabling Various Attacks (Both Cyber and Physical) on Industrial Sites That Historically Were Only Possible in Close Proximity to a Facility or Device]]></description>
		<content:encoded><![CDATA[<p>The Growing Threat of Drones<br />
<a href="https://www.icscybersecurityconference.com/the-growing-threat-of-drones/" rel="nofollow">https://www.icscybersecurityconference.com/the-growing-threat-of-drones/</a></p>
<p>Drones Are Enabling Various Attacks (Both Cyber and Physical) on Industrial Sites That Historically Were Only Possible in Close Proximity to a Facility or Device</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1642543</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 16 Jun 2019 17:26:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1642543</guid>
		<description><![CDATA[Triton is the world’s most murderous malware, and it’s spreading
https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/

The rogue code can disable safety systems designed to prevent catastrophic industrial accidents. It was discovered in the Middle East, but the hackers behind it are now targeting companies in North America and other parts of the world, too.]]></description>
		<content:encoded><![CDATA[<p>Triton is the world’s most murderous malware, and it’s spreading<br />
<a href="https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/" rel="nofollow">https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/</a></p>
<p>The rogue code can disable safety systems designed to prevent catastrophic industrial accidents. It was discovered in the Middle East, but the hackers behind it are now targeting companies in North America and other parts of the world, too.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1640897</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 08:39:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1640897</guid>
		<description><![CDATA[High-Risk Flaws Found in Process Control Systems From B&amp;R Automation 
https://www.securityweek.com/high-risk-flaws-found-process-control-systems-br-automation

Researchers from Positive Technologies have discovered several vulnerabilities in APROL industrial process control systems from Austria-based B&amp;R Industrial Automation.]]></description>
		<content:encoded><![CDATA[<p>High-Risk Flaws Found in Process Control Systems From B&amp;R Automation<br />
<a href="https://www.securityweek.com/high-risk-flaws-found-process-control-systems-br-automation" rel="nofollow">https://www.securityweek.com/high-risk-flaws-found-process-control-systems-br-automation</a></p>
<p>Researchers from Positive Technologies have discovered several vulnerabilities in APROL industrial process control systems from Austria-based B&amp;R Industrial Automation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1640499</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 28 May 2019 10:58:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1640499</guid>
		<description><![CDATA[ICS / IIoT Market Segmentation Needed So We Can Communicate Effectively
https://pentestmag.com/ics-iiot-market-segmentation-needed-so-we-can-communicate-effectively/

There have been many events and data points that show even people knowledgeable in ICS and security are having difficulty communicating together because we have different views and experiences on what an ICS is. The latest example is Kaspersky’s Threat Landscape for Industrial Automation Systems H1 2018 report. The report stated that “42% of all machines had regular or full-time internet connections”, and base on the other statistics a large percentage of that 42% were sending and receiving email. In case you think Kaspersky isn’t looking at ICS, they characterized the 320 computers in the survey as SCADA servers, historians, OPC gateways, engineering workstations (EWS) and operator stations/HMI.

My initial reaction was, that’s crazy. We see almost no direct Internet access from ICS computers and certainly these computers are not receiving email. 

This demonstrates the challenge we have in communicating effectively about ICS when we use these broad terms without some sort of taxonomy. There are even more important areas where this large ICS category inhibits effective communication and action including appropriate architecture, security controls, regulation, and risk. And the confusion is getting worse.

The answer: a taxonomy of ICS/IIoT is needed. 

The taxonomy doesn’t need to be perfect or overly detailed; it’s purpose is to assist in effective communication. Here are some possible categories:

    Value – what would be the consequence if integrity or availability of the ICS/IIoT is compromised?
    Architecture – classic Purdue model, IoT, classic + cloud, ???2
    Maturity of ICSsec program – huge difference in what should be done based on maturity. This is one of the biggest issues today with asset owners just starting their ICSsec efforts spending time and money on actions with minimal risk reduction.
    Sector / System Type – This is the most obvious category. There are some sectors and systems that are homogenous while others, such as the chemical manufacturing, that have significant variance between small and large manufacturers. My thought is you could have three to five numbered sectors, and then place industries in one of those as appropriate. We could then discuss, for example, Sector 2 systems should deploy these security controls or have these threats.
    Your category here … this is far from a complete list of possibilities.

The bundling of more and more sectors and systems into ICS/IIoT term is helpful only in that it is increasing awareness and hopefully corresponding action. It is leading to unhelpful and confusing discussions even amongst those active in ICS. Executives and those peripherally involved in ICS will almost certainly be misled by “ICS” information that is unrelated to their ICS. We need an ICS/IIoT taxonomy.]]></description>
		<content:encoded><![CDATA[<p>ICS / IIoT Market Segmentation Needed So We Can Communicate Effectively<br />
<a href="https://pentestmag.com/ics-iiot-market-segmentation-needed-so-we-can-communicate-effectively/" rel="nofollow">https://pentestmag.com/ics-iiot-market-segmentation-needed-so-we-can-communicate-effectively/</a></p>
<p>There have been many events and data points that show even people knowledgeable in ICS and security are having difficulty communicating together because we have different views and experiences on what an ICS is. The latest example is Kaspersky’s Threat Landscape for Industrial Automation Systems H1 2018 report. The report stated that “42% of all machines had regular or full-time internet connections”, and base on the other statistics a large percentage of that 42% were sending and receiving email. In case you think Kaspersky isn’t looking at ICS, they characterized the 320 computers in the survey as SCADA servers, historians, OPC gateways, engineering workstations (EWS) and operator stations/HMI.</p>
<p>My initial reaction was, that’s crazy. We see almost no direct Internet access from ICS computers and certainly these computers are not receiving email. </p>
<p>This demonstrates the challenge we have in communicating effectively about ICS when we use these broad terms without some sort of taxonomy. There are even more important areas where this large ICS category inhibits effective communication and action including appropriate architecture, security controls, regulation, and risk. And the confusion is getting worse.</p>
<p>The answer: a taxonomy of ICS/IIoT is needed. </p>
<p>The taxonomy doesn’t need to be perfect or overly detailed; it’s purpose is to assist in effective communication. Here are some possible categories:</p>
<p>    Value – what would be the consequence if integrity or availability of the ICS/IIoT is compromised?<br />
    Architecture – classic Purdue model, IoT, classic + cloud, ???2<br />
    Maturity of ICSsec program – huge difference in what should be done based on maturity. This is one of the biggest issues today with asset owners just starting their ICSsec efforts spending time and money on actions with minimal risk reduction.<br />
    Sector / System Type – This is the most obvious category. There are some sectors and systems that are homogenous while others, such as the chemical manufacturing, that have significant variance between small and large manufacturers. My thought is you could have three to five numbered sectors, and then place industries in one of those as appropriate. We could then discuss, for example, Sector 2 systems should deploy these security controls or have these threats.<br />
    Your category here … this is far from a complete list of possibilities.</p>
<p>The bundling of more and more sectors and systems into ICS/IIoT term is helpful only in that it is increasing awareness and hopefully corresponding action. It is leading to unhelpful and confusing discussions even amongst those active in ICS. Executives and those peripherally involved in ICS will almost certainly be misled by “ICS” information that is unrelated to their ICS. We need an ICS/IIoT taxonomy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1639496</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 May 2019 11:58:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1639496</guid>
		<description><![CDATA[Using lean methods to find process improvements
Be involved in improving the work environment around you. 
https://www.csemag.com/articles/using-lean-methods-to-find-process-improvements/

How to value-stream map 

    Make a sticky note with the name of every task and transfer that happens in your business. 

    Place them in sequential order from left to right on a whiteboard. 
    Draw a line horizontally on the board under the sticky notes. 
    For each sticky note, if the task doesn’t change the finished product, put it below the line. 
    Once complete, the notes above the line are tasks that create value, and the tasks below the line do not create value (even if necessary). 


How to do a root-cause analysis 

    Start with an assumption of a problem. 
    Ask what causes the problem. 
    Continue to look for the underlying source of each new problem. 

    Once you cannot find any more causes, you have found your root cause. 


Draw lines to make six equal spaces (Landscape, two columns, three rows). 

Fill out the following items, one in each space: 

    Background: What is the history of the problem? 
    Problem statement: State the problem in the clearest and simplest possible way. 
    Goal or future state: What is the ideal resolution to the problem? 
    Analysis: This can be your root–cause analysis or, even better, hard data that can be measured to prove the problem statement. 
    Proposal: What can be done to move toward the goal or future state? 
    Implementation: Who is your team, what do they do, how do they do it and how do we know we’re winning?]]></description>
		<content:encoded><![CDATA[<p>Using lean methods to find process improvements<br />
Be involved in improving the work environment around you.<br />
<a href="https://www.csemag.com/articles/using-lean-methods-to-find-process-improvements/" rel="nofollow">https://www.csemag.com/articles/using-lean-methods-to-find-process-improvements/</a></p>
<p>How to value-stream map </p>
<p>    Make a sticky note with the name of every task and transfer that happens in your business. </p>
<p>    Place them in sequential order from left to right on a whiteboard.<br />
    Draw a line horizontally on the board under the sticky notes.<br />
    For each sticky note, if the task doesn’t change the finished product, put it below the line.<br />
    Once complete, the notes above the line are tasks that create value, and the tasks below the line do not create value (even if necessary). </p>
<p>How to do a root-cause analysis </p>
<p>    Start with an assumption of a problem.<br />
    Ask what causes the problem.<br />
    Continue to look for the underlying source of each new problem. </p>
<p>    Once you cannot find any more causes, you have found your root cause. </p>
<p>Draw lines to make six equal spaces (Landscape, two columns, three rows). </p>
<p>Fill out the following items, one in each space: </p>
<p>    Background: What is the history of the problem?<br />
    Problem statement: State the problem in the clearest and simplest possible way.<br />
    Goal or future state: What is the ideal resolution to the problem?<br />
    Analysis: This can be your root–cause analysis or, even better, hard data that can be measured to prove the problem statement.<br />
    Proposal: What can be done to move toward the goal or future state?<br />
    Implementation: Who is your team, what do they do, how do they do it and how do we know we’re winning?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1639450</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 May 2019 10:59:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1639450</guid>
		<description><![CDATA[Wormable Windows RDS Vulnerability Poses Serious Risk to ICS
https://www.securityweek.com/wormable-windows-rds-vulnerability-poses-serious-risk-ics

A critical remote code execution vulnerability patched recently by Microsoft in Windows Remote Desktop Services (RDS) poses a serious risk to industrial environments, experts have warned.

Microsoft’s Patch Tuesday updates for May 2019 resolve nearly 80 vulnerabilities, including a flaw that can be exploited by malware to go from one device to another similar to how WannaCry spread back in 2017.

This security hole, tracked as CVE-2019-0708, impacts RDS (formerly Terminal Services) and it allows an unauthenticated attacker to take control of a device without any user interaction. The flaw can be exploited by sending specially crafted requests to the targeted machine’s RDS via the Remote Desktop Protocol (RDP).]]></description>
		<content:encoded><![CDATA[<p>Wormable Windows RDS Vulnerability Poses Serious Risk to ICS<br />
<a href="https://www.securityweek.com/wormable-windows-rds-vulnerability-poses-serious-risk-ics" rel="nofollow">https://www.securityweek.com/wormable-windows-rds-vulnerability-poses-serious-risk-ics</a></p>
<p>A critical remote code execution vulnerability patched recently by Microsoft in Windows Remote Desktop Services (RDS) poses a serious risk to industrial environments, experts have warned.</p>
<p>Microsoft’s Patch Tuesday updates for May 2019 resolve nearly 80 vulnerabilities, including a flaw that can be exploited by malware to go from one device to another similar to how WannaCry spread back in 2017.</p>
<p>This security hole, tracked as CVE-2019-0708, impacts RDS (formerly Terminal Services) and it allows an unauthenticated attacker to take control of a device without any user interaction. The flaw can be exploited by sending specially crafted requests to the targeted machine’s RDS via the Remote Desktop Protocol (RDP).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1638667</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 13 May 2019 10:32:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1638667</guid>
		<description><![CDATA[Over 100 Flaws Expose Buildings to Hacker Attacks
https://www.securityweek.com/over-100-flaws-expose-buildings-hacker-attacks

A researcher has discovered over 100 vulnerabilities in building management and access control systems from four major vendors. An attacker can exploit these flaws to gain full control of impacted products and manipulate the systems connected to them.

Krstic has identified a total of over 100 security holes in these systems to which nearly 50 CVE identifiers have been assigned; some of the issues are variations of the same flaw.

The vulnerabilities include default and hardcoded credentials, command injection, cross-site scripting (XSS), path traversal, unrestricted file upload, privilege escalation, authorization bypass, clear-text storage of passwords, cross-site request forgery (CSRF), arbitrary code execution, authentication bypass, information disclosure, open redirect, user enumeration, and backdoors.

Krstic said during his presentation that the flaws could impact up to 10 million people and 30,000 doors at 200 facilities; the estimate is based on product documentation and online information.

A Shodan search revealed over 2,500 systems that are directly exposed to the internet, many made by Nortek.]]></description>
		<content:encoded><![CDATA[<p>Over 100 Flaws Expose Buildings to Hacker Attacks<br />
<a href="https://www.securityweek.com/over-100-flaws-expose-buildings-hacker-attacks" rel="nofollow">https://www.securityweek.com/over-100-flaws-expose-buildings-hacker-attacks</a></p>
<p>A researcher has discovered over 100 vulnerabilities in building management and access control systems from four major vendors. An attacker can exploit these flaws to gain full control of impacted products and manipulate the systems connected to them.</p>
<p>Krstic has identified a total of over 100 security holes in these systems to which nearly 50 CVE identifiers have been assigned; some of the issues are variations of the same flaw.</p>
<p>The vulnerabilities include default and hardcoded credentials, command injection, cross-site scripting (XSS), path traversal, unrestricted file upload, privilege escalation, authorization bypass, clear-text storage of passwords, cross-site request forgery (CSRF), arbitrary code execution, authentication bypass, information disclosure, open redirect, user enumeration, and backdoors.</p>
<p>Krstic said during his presentation that the flaws could impact up to 10 million people and 30,000 doors at 200 facilities; the estimate is based on product documentation and online information.</p>
<p>A Shodan search revealed over 2,500 systems that are directly exposed to the internet, many made by Nortek.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/06/14/ics-companies-are-worried-about-cybersecurity-but-are-they-worried-about-right-things/comment-page-6/#comment-1637690</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 06 May 2019 07:11:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=56354#comment-1637690</guid>
		<description><![CDATA[According to X-Force Red data collected from our vulnerability database, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. This doesn’t only mean that these systems are likely becoming more vulnerable every year; it may also mean that already vulnerable systems are possibly under attack, which would expose issues that were there before and now come to light. Furthermore, the rising awareness of threats to ICS-rich environments is resulting in better documentation of vulnerabilities and flaws.
https://securityintelligence.com/posts/industrial-control-systems-security-to-test-or-not-to-test/]]></description>
		<content:encoded><![CDATA[<p>According to X-Force Red data collected from our vulnerability database, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. This doesn’t only mean that these systems are likely becoming more vulnerable every year; it may also mean that already vulnerable systems are possibly under attack, which would expose issues that were there before and now come to light. Furthermore, the rising awareness of threats to ICS-rich environments is resulting in better documentation of vulnerabilities and flaws.<br />
<a href="https://securityintelligence.com/posts/industrial-control-systems-security-to-test-or-not-to-test/" rel="nofollow">https://securityintelligence.com/posts/industrial-control-systems-security-to-test-or-not-to-test/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
