Month: October 2017

Is your protocol safe on its own?

Some companies hold the belief that its standard protocol is safe from the threat of cyberattacks, or leaked information. For example, the DNP3 (version 5) protocol – though is relatively new, is a secure protocol. To measure the amount of risk, companies must measure it by the algorithm Risk=Threat x Vulnerability x Consequence. Though this…

Read more