Customer Testimonial – Dalia Energy

[embed]https://www.youtube.com/watch?v=nwstIKSsMyw&t=1s[/embed] ...

SIGA’s Founders Video

[embed]https://www.youtube.com/watch?v=tahbqiAJtI0[/embed] Hear ...

SIGA OT Solutions @ US Midwest TAG 30

SIGA presenting it's cutting-edge architecture and technology as part of ...

SIGA’s CTO was hosted in the Unsolicited Response podcast

Check out SIGA's CRO, Ilan Gendelman fascinating interview with Dale ...

Attack Scenario 4: Spoofing OT networks

Machines utilize electrical signals as their language to communicate their ...

Attack Scenario 3: Under the radar

Malicious worms can find their ways into your most valuable assets - it ...

Attack Scenario 2: “Feeling your machinery’s pulse”- OT ransomware attacks

Ransomware attacks are on the rise, which leaves the OT environment of your ...

Attack Scenario 1: (Un)authorized Access

Cyber menaces do not stem solely from the outside. Insiders who are granted ...

“THE NEXT EVOLUTION OF OT CYBER SECURITY” WEBINAR HOSTED BY ST ENGINEERING

Ilan Sosnovitch presented the challenges of OT Cyber protection and ...

PODCAST -“LAYER ZERO ANOMALY DETECTION”

The webinar “THE NEXT EVOLUTION OF OT CYBER SECURITY”. Ilan ...

HOW TO PREPARE FOR A CYBER ATTACK & PROTECT YOUR INDUSTRIAL ASSETS

The webinar “THE NEXT EVOLUTION OF OT CYBER SECURITY”. Ilan ...

“Man-in-the-Middle” attacks – in OT/ICS environments

With the growing involvement of government sponsor hacker groups targeting ...