Centripetal Networks Announces Cybersecurity Partnership with Dynics

RESTON, Va. and ANN ARBOR, Mich., May 18, 2022 — Centripetal Networks, Inc. today announced a new partnership with Dynics, Inc. providing clients with integrated industrial cybersecurity protection that extends from the internet to the factory floor. “Our integration with Dynics combines their ICS Defender solution with our CleanINTERNET intelligence-driven, network defense service,” said Jonathan Rogers, COO at Centripetal Networks. […]
What is IIoT and How Does It Impact Cybersecurity In Manufacturing?

The Industrial Internet of Things (IIoT), a sub-category of the Internet of Things (IoT), has been transformative for many industries. A market sized at over $263 billion in 2021, IIoT encompasses sensor-embedded devices, cloud-based data, and interconnected machines which reduce downtime, improve performance, and lower costs. Manufacturing firms are leading the charge in IoT adoption; […]
How Cyber Threat Intelligence as a Fully Managed Service Can Provide Better Security for the Finance Sector

The financial sector continues to be one of the most heavily attacked industries, so it makes sense that it consistently spends more than others on cybersecurity. Bank of America, for instance, claimed just last year that it spends more than a billion dollars a year in cybersecurity. Much of that, no doubt, inspired by the […]
Cyberattacks on Food and Agriculture – How Hackers Target Our Most Critical Industry

Our lives depend on the food and agriculture industry. It’s a vital part of our Critical National Infrastructure (CNI), and has huge financial value, contributing $1.055 trillion to the US GDP in 2020 (a 5% share). But hackers see the world’s dependence on food and agriculture as an opportunity to target the industry with cyberattacks […]
How to Defeat Ransomware with ThreatOps

Over the last few years, we’ve seen quite an uptick around a host of new cyberthreat intelligence (CTI) solutions promising to help combat the steady rise in ransomware attacks. If you’re not familiar with them, CTI solutions were designed to collect publicly available cyberthreat data from across the globe that they could package and sell […]