Recent global events have convinced us that digital transformation is here to stay and, in fact, accelerating. Companies that had already begun to embrace...
Hi, what are you looking for?
Recent global events have convinced us that digital transformation is here to stay and, in fact, accelerating. Companies that had already begun to embrace...
We All Share the Same Objective of Risk Reduction, But in an OT Environment That Must be Implemented in a Different Way
OT Networks Are Often a Black Box for Security Teams and Don’t Have the Telemetry to See and Monitor Industrial Environments
Thinking of Your OT Network as an Extension of Your IT Network Will Give You a Consolidated Picture of Your Technology Infrastructure
Advice for CISOs on Bridging the IT-OT Security Gap: Part 1
Strategies for Evaluating Secure Remote Access Solutions for OT/ICS Networks
In my previous column, I talked about the rapidly changing geopolitical landscape and the escalation of cyberattacks on critical infrastructure. Some of you may...
Organizations Must Understand What’s Driving the Escalated Targeting of Industrial Networks
The Opportunity for OT Security Teams to Fill the Gaps in Their Visibility Has Never Been Better
The Next Year Will Surprise All of Us in at Least One Way or Another
Critical Infrastructure Operators Must Plan for Scenarios in Which a Physical and Cyber Event Occur Simultaneously
Let’s start this column with some good news.
I touched on network segmentation in my previous column, You Know You’re at Risk, Now What? and although it is a fairly foundational security...
Last month, in The War Few are Talking About, I described industrial cyberattacks as a form of “economic warfare” designed to advance geopolitical agendas.
There is a growing war among nations and the potential victims may not even know they are targeted as pawns in a larger geopolitical...
Nothing in industrial cybersecurity is as simple as ABC. Protecting complex, yet aging industrial networks against direct and indirect attacks, planned by increasingly sophisticated...
We Need a New Framework for Thinking About ICS and Critical Infrastructure Network Security By Galina Antova and Eric Cosman
In my previous column, I outlined a series of high-level, prescriptive steps for organizations to follow to better the security posture of their Industrial...
These Prescriptive Steps Can Help the State of Security in Your ICS Network Environment
In 2005, the breach of Card Systems (a major payment card processor), which exposed 40+ million credit cards, was labeled “The Biggest Hack of...