Imagen decorativa Avisos
Blog posted on 17/05/2018

I have identified a vulnerability in a device within an industrial control system... Now what? This article provides the guidelines to be followed when a vulnerability within an industrial control system is detected, and the different phases of this process.