Lee Clough

By

Banner image titled 'Deconstructing a Phishing Attack: A Step-by-Step Analysis' with the Pride Security logo on the right. The background shows a dark, deserted train platform, creating a sense of caution and awareness.
A deep dive into a sophisticated phishing attack that used advanced obfuscation techniques to bypass security filters and steal user credentials. Learn how the attack was decoded and how to protect against such threats.
Rolling Stock Security Key Cybersecurity Best Practices and Strategies
Explore the importance of cybersecurity in the railway sector, understanding how to safeguard trains from cyber threat through incident response.
Explore how board directors can drive cyber security in the railway industry through collaboration, strategic planning, regulatory compliance, and budgeting.
Explore the importance of cyber security in the transport sector and how compliance with international standards ensures robust security practices.
Explore the role of technology in bolstering railway cyber security. Learn about key practices, relevant regulations, and beneficial tech tools.
The Evolution Of Rolling Stock Cyber Security Threats & Protections
Dive into the historical overview of cyber security evolution in the rolling stock industry. Understand emerging threats and how the sector is responding.
Secure by Design: Incorporating Cyber Security into Trains from Build
Explore the importance of 'Secure by Design' for rolling stock systems, historical cyber-attacks on railways, and best practices for proactive cyber security.
Cyber Attack Exploring the Impact on the Italian Railways
Explore the vital role of cybersecurity in railway infrastructure, understand the impact of a major cyber attack & learn about effective prevention strategies.
Cyber Attack Strong Defence Tactics For Secure Trains
Explore strategies to combat against cyber attack in the rail industry, focusing on risk assessment, response protocols and regular security tests.
Strong Cyber Security Effective Technology In The Railway
Explore the importance of cyber security of trains, looking at technologies like packet inspection firewalls & behavioural analysis intrusion detection systems
1 2 3