Articles Directory: Explore Our Publications Page 27

Gigabit Ethernet an Informative Guide

IP vs. Gigabit - Related Articles IPv4 vs. IPv6 vs. Gigabit Ethernet IPv4 vs. IPv6 Back to the August 2018 - Newsletter…
Read More

Comparing IPv4, IPv6, and Gigabit Ethernet: A Comprehensive Analysis

IPv4, IPv6, and Gigabit Ethernet are often mentioned together when discussing modern networks, but they operate at different layers of the networking stack and serve dis…
Read More

How is BACnet Vulnerable?

The following 19 services & 5 features provided by the BACnet protocol offer significant vulnerabilities to attack. This is how BACnet opens the door to various attacks.…
Read More

Cyber Attack Impact on Building Automation Systems

Cyber attacks against building automation systems can cause real-world physical, operational, and safety impacts. These impacts range from temporary s…
Read More

Protocol Security Gateway: Shielding BACnet IP Business Plan

Executive Summary Industry and Company What We Are Trying To Solve: Attacks on Non-Critical system components How Can Attacks Cause Harm - What are we Protecting? Why BACnet IP? BACnet IP…
Read More

Protocol Security Gateway

Next Step: View the Protocol Security Gateway Business Plan A…
Read More

Easy to Attack: Why Tiny Building Automation Markets Increase Cyber Risk

Building automation and industrial controls often live in small, fragmented product markets. Compared to mainstream IT platforms, fewer deployments and fewer eyes on the…
Read More

Large Critical Systems Under Attack

Large-scale critical systems are often protected by multiple layers of redundancy, safety mechanisms, and operational controls. However, history shows that failures or a…
Read More

Protocol Security Gateway Proposition

Protocol Security Gateway Proposition – Overview This section provides an organized entry point into Chipkin’s work on Protocol Security Gateways (PSGs)…
Read More

Design Flaw Vulnerabilities

Vulnerabilities are UbiquitousThere are thousands of vendors with tens of thousands of products. Each of which can have design flaws and vulnerabilities.Many products use underlying resources (like L…
Read More

Functional Description of Product

Protocol Security Gateway (PSG) - How it works By device we mean the controller of a process or of a physical device such as a generator, sensor, lighting system, motors etc. Devices are monitored an…
Read More

Value Proposition for Investors

This page outlines the core value proposition behind a cybersecurity-focused product designed to protect institutions, infrastructure, and mission-cr…
Read More

Contact Us

Contact us via phone (+1 866-383-1657) or leave a detailed message below for sales, support, or any other needs

*Required Field
*Required Field
I'd like to receive the newsletter. *Check email for confirmation.
*Required Field
8:00am - 12:00pm 12:00pm - 5:00pm
Message Sent Successfully