Top White Papers and Webcasts

  • On-Demand Webinar Critical environments rely on accurate and timely information from the electrical infrastructure which is made up of switchgear, generators, transfer switches, UPS, PDUs, and more.   The components of this infrastructure need to be networked and monitored by a dedicated Electrical Power Monitoring System (EPMS) to help avoid downtime or understand what happens should events occur. The EPMS is located on-premise. We call this local layer the “Edge.”   In our …

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …