PLATFORM
PLATFORM
THE DRAGOS PLATFORM
Asset Visibility
Passive & active
Vulnerability Management
Now, next, & never
Threat Detection
Fast, accurate, & complete
Response Playbooks
Fastest time to resolution
SERVICES
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
INTELLIGENCE
THREAT INTELLIGENCE
Dragos WorldView
The latest actionable intel
Dragos WorldView Concierge & RFI
Customized intel for your org
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
SERVICES
PROACTIVE SERVICES
OT Cyber Assessment
Evaluate & evolve architecture
Red Team Services
Identify vulnerabilities
OT Tabletop Exercises
Scenarios to evaluate response
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Reactive Services
Incident Response
OT experts responding to your worst day
Rapid Response Retainer
IR experts available 24/7
Dragos 2025 OT Cybersecurity Year in Review
Understand the threats, vulnerabilities, and victories of the past year.
Explore The Intel
INSIGHTS
FUNDAMENTALS
OT Cybersecurity Basics
Build a stronger OT security strategy
5 Critical Controls
SANS ICS framework for defense
Industrial Risk Management
Quantifying OT risk and dependencies
THREATS
Monitoring Threat Groups
Know your adversary
Year in Review Report
8th annual threat report
REGULATIONS
OT Compliance
NIS2, CAF v4, SOCI/SONS, TSA, & more
NERC CIP
Dragos Alignment
INSM Compliance
Path for NERC-CIP-015
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
RESOURCES
RESOURCES
RESOURCES
Threat Reports
Whitepapers
Datasheets
Solution Briefs
Case Studies
Blog
Webinars
Dragos Industrial Security Conference
COMMUNITY
COMMUNITY
OT-CERT Program
Community Defense Program
ACADEMY
DRAGOS ACADEMY
On-Demand Training
Free OT Cybersecurity Quick Start Guide for IT
Essential reading for IT security pros tackling OT cybersecurity.
Download Now
COMPANY
ABOUT
About Dragos
We make defense doable
Leadership
Experts in defense
Newsroom
Up-to-date cyber news
Careers
Current job openings
EVENTS
Event Calendar
Connect in person
Dragos Industrial Security Conference
Register for DISC 2025
Dragos Forums
NAM, EMEA, & APJ
PARTNERS
Partner Ecosystem
Technology, Alliance, & GTM
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Explore the Intel
Contact Us
Menu
PLATFORM
PLATFORM
THE DRAGOS PLATFORM
Asset Visibility
Passive & active
Vulnerability Management
Now, next, & never
Threat Detection
Fast, accurate, & complete
Response Playbooks
Fastest time to resolution
SERVICES
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
INTELLIGENCE
THREAT INTELLIGENCE
Dragos WorldView
The latest actionable intel
Dragos WorldView Concierge & RFI
Customized intel for your org
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
SERVICES
PROACTIVE SERVICES
OT Cyber Assessment
Evaluate & evolve architecture
Red Team Services
Identify vulnerabilities
OT Tabletop Exercises
Scenarios to evaluate response
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Reactive Services
Incident Response
OT experts responding to your worst day
Rapid Response Retainer
IR experts available 24/7
Dragos 2025 OT Cybersecurity Year in Review
Understand the threats, vulnerabilities, and victories of the past year.
Explore The Intel
INSIGHTS
FUNDAMENTALS
OT Cybersecurity Basics
Build a stronger OT security strategy
5 Critical Controls
SANS ICS framework for defense
Industrial Risk Management
Quantifying OT risk and dependencies
THREATS
Monitoring Threat Groups
Know your adversary
Year in Review Report
8th annual threat report
REGULATIONS
OT Compliance
NIS2, CAF v4, SOCI/SONS, TSA, & more
NERC CIP
Dragos Alignment
INSM Compliance
Path for NERC-CIP-015
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
RESOURCES
RESOURCES
RESOURCES
Threat Reports
Whitepapers
Datasheets
Solution Briefs
Case Studies
Blog
Webinars
Dragos Industrial Security Conference
COMMUNITY
COMMUNITY
OT-CERT Program
Community Defense Program
ACADEMY
DRAGOS ACADEMY
On-Demand Training
Free OT Cybersecurity Quick Start Guide for IT
Essential reading for IT security pros tackling OT cybersecurity.
Download Now
COMPANY
ABOUT
About Dragos
We make defense doable
Leadership
Experts in defense
Newsroom
Up-to-date cyber news
Careers
Current job openings
EVENTS
Event Calendar
Connect in person
Dragos Industrial Security Conference
Register for DISC 2025
Dragos Forums
NAM, EMEA, & APJ
PARTNERS
Partner Ecosystem
Technology, Alliance, & GTM
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Explore the Intel
Contact Us
Login
Search Query
Submit Search
Show Search
Search Results
Submit
1,045 Results
Type
Author (69)
Industry (11)
Page (66)
Partner (67)
Threat Group (23)
Resource Type
Case Study (16)
Datasheet (35)
Guide (26)
Infographic (35)
News (6)
Partner Brief (30)
Press Release (68)
Report (39)
Solution Brief (41)
Video (3)
Webinar (68)
Whitepaper (42)
Industries
Building Automation Systems Cybersecurity (6)
Chemical Cybersecurity (6)
Electric Grid Cybersecurity (41)
Food & Beverage Cybersecurity (6)
Manufacturing Cybersecurity (30)
Metals & Mining Cybersecurity (3)
Oil & Gas Cybersecurity (31)
Pharmaceuticals Cybersecurity (5)
Public Sector Cybersecurity (6)
Transportation Cybersecurity (8)
Water & Wastewater Facilities Cybersecurity (17)
Partners
Anomali (2)
AWS (7)
Carahsoft Technology Corp (1)
Cisco (3)
CrowdStrike (6)
Cyolo (1)
Deloitte (4)
Emerson (4)
Fortinet (3)
Garland Technology (1)
GE Vernova (2)
Hexagon (1)
IBM (2)
IBM Applications (1)
ICS Village (1)
ISA (1)
Keysight Technologies (2)
LogRhythm (1)
Micro Focus (2)
Microsoft Sentinel (1)
Owl Cyber Defense (1)
Palo Alto Networks (4)
PwC (1)
Rockwell Automation (5)
Schweitzer Engineering Laboratories (SEL) (3)
ServiceNow (4)
Splunk (6)
Splunk Applications (2)
Swimlane (1)
Technology Advancement Center (TAC) (1)
The Chertoff Group (1)
Trellix (2)
TruSTAR (1)
Yokogawa (1)
Products & Services
Asset Visibility (45)
Collective Defense (22)
DISC (7)
Professional Services (42)
The Dragos Platform (113)
Threat Intelligence & Hunting (208)
Training (11)
Threat Group
CHERNOVITE (6)
ELECTRUM (1)
STIBNITE (1)
TALONITE (1)
VANADINITE (1)
VOLTZITE (1)
XENOTIME (1)
Topics
Audit & Compliance (59)
Cyber Readiness (57)
Five Critical Controls (5)
Malware & Ransomware (49)
Network Security Monitoring (1)
OT Cybersecurity Fundamentals (8)
Risk Management (92)
Security Frameworks (20)
Year in Review (14)
There are 1,045 results that match your search.
Filters
Sort By
Relevance
Relevance
Newest
Oldest
Deborah C. Hopkins
Deborah C. Hopkins is an accomplished C-suite executive and board member with extensive experience in finance, technology, cybersecurity, and innovation across multiple industries. She serves on the boards of Union Pacific, Marsh McLennan, and Bridge Investment Group.
September 4, 2025 04:02 PM
Phil Jones
Philip Jones is currently President of Phil Jones Consulting LLC based in Seattle, Washington, that provides expert advice and consulting services for organizations in the fields of energy and utility regulation, communications regulation, and cybersecurity compliance and regulation. He is continuing to work in the fields of market development and potential independent system operators (ISO’s) in the Western States, as well as in EV (electric vehicle) infrastructure and distributed energy resources
September 4, 2025 04:00 PM
Jeff Williams
Jeff Williams is currently at Bain Capital Ventures as an Operating Partner in the Bay Area, where he focuses on infrastructure software and security. He has more than 25 years of operating experience helping early-stage enterprise software companies to scale and grow into market leaders.
September 4, 2025 03:59 PM
Tom Lounibos
Tom Lounibos is a six time successful Silicon Valley entrepreneur, investor, board member, and advisor to corporations and technology startups in the United States and Europe. Most recently, Tom co-founded SOASTA in 2006 and served as CEO until Akamai acquired the company in 2017. When it was acquired, SOASTA had become the Leading Performance Analytics Platform in the digital world.
September 4, 2025 03:49 PM
Ambika Gadre
Over her career, Ambika Gadre has led product innovation from inception to market leadership at companies like Bracket Computing (a pioneer in Cloud Workload Protection) and IronPort Systems (acquired by Cisco in 2007 for $830M), as well as $1.2B portfolio across three business units building Cisco’s Network Security, Content Security and Identity Management products and $1B+ mid-range workstation product line at Silicon Graphics.
September 4, 2025 03:45 PM
Metals & Mining Cybersecurity
Protect mining operations from cyber threats with Dragos’s industry-specific OT security platform. Ensure safety, compliance, and operational continuity across global mining sites.
September 4, 2025 02:16 PM
Guide
Essential Strategies for Dragos Platform Sensor Deployment
Use Dragos’ pre-deployment checklist to plan sensor deployments, improve OT collaboration, secure critical assets, and ensure efficient, successful Dragos Platform implementation
September 4, 2025 01:37 PM
Guide
OT Network Traffic Validation Steps for Dragos Sensors
Use Dragos’ checklist to verify Cisco SPAN configuration for OT traffic, including packet capture, analysis, and topology review before connecting Dragos Sensors.
September 4, 2025 01:37 PM
Guide
Getting Started: Default Password and Internet Connected Devices
Start OT cybersecurity simply with Dragos’ guide on default passwords and internet-connected devices to reduce risk and secure critical systems step by step
September 4, 2025 01:37 PM
Guide
An Executive’s Guide to Industrial Cybersecurity: What You Need to Know
Download Dragos’ executive guide to understand OT systems, growing cybersecurity risks, and how to secure industrial operations amid digital transformation.
September 4, 2025 01:37 PM
Guide
Dragos Corporate Overview
Dragos protects global industrial infrastructure with purpose-built ICS/OT cybersecurity technology and services, backed by expert threat intelligence and industry knowledge.
September 4, 2025 01:37 PM
Solution Brief
CISA Binding Operational Directive (BOD) Advisory
The Dragos Platform helps federal agencies meet CISA Binding Operational Directive requirements for asset discovery, vulnerability detection, and reporting, strengthening overall OT/ICS security.
September 4, 2025 11:50 AM
Solution Brief
CMMC 2.0 Cybersecurity Practices
Dragos helps ICS/OT asset owners meet CMMC 2.0 requirements, minimize compliance barriers, and accelerate cyber maturity to protect DoD-sensitive operations from evolving threats
September 4, 2025 11:48 AM
Building Automation Systems Cybersecurity
Protect your smart building infrastructure with industry-leading OT cybersecurity solutions designed specifically for building automation systems (BAS).
September 4, 2025 11:38 AM
Solution Brief
Cyber Assessment Framework
Learn how Dragos helps implement the UK NCSC Cyber Assessment Framework (CAF) 4.0, supporting IT and OT cybersecurity across critical infrastructure and public sector organizations.
September 4, 2025 11:38 AM
Solution Brief
Dragos and AWS Solution Brief
Dragos and AWS combine on-prem Sensors with cloud-hosted Dragos Platform to provide scalable, flexible OT cybersecurity, managing risk across expanding ICS/OT environments
September 4, 2025 11:36 AM
Solution Brief
How Dragos and NP-View Support Australian Energy Sector Cyber Security
This solution brief outlines how these tools support risk management, threat detection, and incident response in the energy sector.
September 4, 2025 11:34 AM
VOLTZITE
Uses LOTL techniques for reconnaissance, enumeration, lateral movement, and long-term persistent access.
September 4, 2025 11:25 AM
HEXANE
Uses third-party connections from telecom providers for network access to industrial organizations.
September 4, 2025 11:23 AM
CHERNOVITE
Development of ICS malware to disrupt, degrate, and destroy industrial environments and processes.
September 4, 2025 11:19 AM
DYMALLOY
Deep ICS environment information gathering, including operator credentials and industrial processes.
September 4, 2025 11:15 AM
RASPITE
Credential capture and LOTL techniques employed for initial access, reconnaissance C2.
September 4, 2025 11:13 AM
KAMACITE
Spearphishing, exploiting SOHO routers, and leveraging custom capabilities to enable ELECTRUM operations.
September 4, 2025 11:11 AM
ALLANITE
Watering-hole and phishing attacks leading to ICS reconnaissance and screenshot collection.
September 4, 2025 11:08 AM
GANANITE
Impersonates victims, exploits vulnerabilities, targets internet-exposed endpoints, and exfiltrates data.
September 4, 2025 11:06 AM
Previous
12 of 42
Next