The Recycling of Industrial Cyber-Attacks

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security…

[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity

[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity

Although WannaCry and Petya did not specifically target industrial networks, they did reach them. Many IT leaders and their board of directors responded in panic. The incidents raised the profile of how malware can move to ICS environments. It opened up perspective…

5G is Coming – IoT Security Remains an Unanswered Challenge

5G is Coming – IoT Security Remains an Unanswered Challenge

Why IoTs have created a security crisis and strained the communications infrastructure along the way. Quick Hit Points:  Mobile phone markets are completely saturated, yet the IoT market, in its infancy, still outnumbers mobile phones 2:1…

A Cybersecurity Strategy Guide for Your Power Grid

A Cybersecurity Strategy Guide for Your Power Grid

To thrive in today’s dynamic market, power utilities require new types of smart grid and control applications that enable them to optimize grid efficiency and utilize renewable energy sources. As power grids become more intelligent with…

IIoT is the Firewall Chasm: Airwall is the Solution

IIoT is the Firewall Chasm: Airwall is the Solution

Network Effects are Powerful Since the early days of TCP/IP, connectivity-driven convergence has created waves of multi-billion dollar markets, seemingly out of thin air. All of the successes thus far have had one thing in common:…

Cyber Insurance for Critical Infrastructure and Debate About War

Cyber Insurance for Critical Infrastructure and Debate About War

For those concerned about cybersecurity and critical infrastructure, there is nothing more terrifying than the prospect of a successful cyber-attack on a dam or powerplant.  The after effects of such an attack could have potentially catastrophic…

How to Regulate Cybersecurity of the Internet of Things

How to Regulate Cybersecurity of the Internet of Things

I had the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition.  As the number of connected devices grows and these devices are increasingly used to perpetrate “botnets”,…

Protecting Smart Buildings from Cyber Attacks

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area…

[White paper] A new approach to cyber defense automation

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed,…