Blog posted on 17/05/2018
I have identified a vulnerability in a device within an industrial control system... Now what?
This article provides the guidelines to be followed when a vulnerability within an industrial control system is detected, and the different phases of this process.