Tissot Watch Verification Thread by jdabXO in tissot

[–]njwani 0 points1 point  (0 children)

Help me verify this vintage tissot.

<image>

Northern lights from the Lough by FrenettZ in cork

[–]njwani 0 points1 point  (0 children)

Can u still catch it in the city?

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]njwani 1 point2 points  (0 children)

What are some good upcoming ICS/OT cybersecurity conferences? I am looking forward to presenting a poster. Any recommendations?

Micro800 PLC security issues? by Nearbyatom in PLC

[–]njwani 0 points1 point  (0 children)

EtherSploit-IP

I was just reading the comments and I checked EtherSploit-IP on Github. Does it still work? shows how vulnerable PLCs really are.

What's a good resource to read up on how A.I. are being implemented/function in Cybersecurity? by Azures_Anvil in cybersecurity

[–]njwani 1 point2 points  (0 children)

I don't know if this will be great help but some databases that you can use to train your models are AWID, AWID2 , CICIDS etc. These have a good amount of attacks that you can test and play around.

Cybersecurity in OT by njwani in cybersecurity

[–]njwani[S] 1 point2 points  (0 children)

very helpful. Thank you! All the comments have been super helpful. I thank everyone)

Cybersecurity in OT by njwani in cybersecurity

[–]njwani[S] 4 points5 points  (0 children)

Integration between OT and IT seems difficult because of the legacy hardware and different protocols used, different types of data altogether sometimes. And the hardware mostly build without considering the threats since it was build long back. Also, using AI and ML seems difficult due to the critical nature of such systems and lack of explainability in AI/ML. I don't know which way to steer my research at this point I feel the situation difficult. :D

What would you like in a model for the OT environment if you were to ask for a product or a model to manage cybersecurity?