Search Results

1,064 Results
Type
Resource Type
Industries
Partners
Products & Services
Threat Group
Topics
There are 1,064 results that match your search.
  • Datasheet
    The Dragos Platform is specifically designed for the unique challenges of industrial environments. Learn more about how Dragos can help you protect what matters most – download the Dragos Platform datasheet today.
  • Matt is Director, Business Development at Dragos where he is responsible for defining and establishing strategic partnerships that increase the value proposition of Dragos technologies and solutions to customers around the globe.
  • Liz Martin joined Dragos as a Solutions Architect from the National Security Agency (NSA), where she held previous roles as a Network Warfare Cyber Planner and Computer Network Defense Analyst. Liz is well-versed in leading major incident response efforts as well as network assessments across the U.S. Government and Intelligence Community supporting the defense of National Security Systems. She holds a master’s degree in cybersecurity technology and bachelor’s degree in cybersecurity management and policy. Liz was previously a competitive female bodybuilder and personal trainer.
  • Scott Bear is a Principal Threat Analyst at Dragos focused on threats to energy infrastructure. He brings a decade of U.S. Air Force experience in host and network forensics, incident response, threat hunting, and penetration testing, followed by roles at CrowdStrike and Dragos.
  • Infographic
    OT cyber threats are accelerating, putting $329B at risk and collapsing detection-to-impact timelines from months to hours. Get the infographic to see why modern attacks move faster than ever and what you need to you defend critical operations at speed.
  • Jimmy Wylie is a Technical Lead Malware Analyst at Dragos, Inc. who spends his days (and nights) searching for and analyzing threats to critical infrastructure. He was the lead analyst on PIPEDREAM, the first ICS attack “utility belt”, TRISIS, the first malware to target a safety instrumented system, and analysis of historical artifacts of the CRASHOVERRIDE attack, the first attack featuring malware specifically tailored to disrupt breakers and switchgear in an electric transmission substation.
  • Report
    This threat perspective from WorldView translates the current OT/ICS threat landscape for distributed energy resources (DER) and microgrids into clear steps that OT teams and leaders can take now.
  • Get proactive defense with OT Watch Complete. We operate the Dragos Platform for you—monitoring, validated escalations, tuning, and more.
  • On-demand answers or continuous guidance: OT cyber threat intelligence expertise tailored to your security needs.
  • Expert red team services for OT environments: vulnerability discovery, attack simulation, and detection training to validate industrial security controls.
  • Get specific, prioritized guidance to reduce risk and strengthen your industrial control system defenses with OT security assessments.
  • Immediately access OT cybersecurity experts with a Rapid Response Retainer. Pre-established agreements mean faster containment when crisis strikes.
  • Webinar
    OT environments have blind spots—unknown assets, unmanaged vulnerabilities, and misconfigurations. Adversaries exploit these in hours. Join our webinar that covers building real-time OT/IoT visibility, reducing lateral movement risks, and enabling faster threat response.
  • Press Release
    New Insights Hub, AI-Enhanced Vulnerability Analysis, and Streamlined Workflows Accelerate Time-to-Value for Industrial Defenders
  • Webinar
    In this session, we will breakdown new enhancements to the Dragos Platform including enhancements to our asset inventory capabilities and how the Platform streamlines the threat and vulnerability workflows to aid in response.
  • Infographic
    Cancels and supersedes Security Directive Pipeline-2021-02E. Its goal is to protect the national security, economy, and public health and safety of the United States from the impact of malicious cyber intrusions affecting the nation’s most critical gas and liquid pipelines.
  • Whitepaper
    This whitepaper examines how Dragos Platform analytics detect threats like TRISIS malware, demonstrating how threat intelligence generates high-fidelity alerts and highlighting the telemetry requirements for each of the four detection types used in the Dragos Platform.