[White paper] A new approach to cyber defense automation

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed,…

Simple NIST cybersecurity Compliance for Manufacturing

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage,…

Attack Vectors in the… Trillions?

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality…

Securing our Energy Future

Securing our Energy Future

ENERGY! – It’s the most vital, indispensable resource for sustaining and advancing humankind. Much as Oxygen is essential for all life on earth, Electricity – the foremost and primary useful energy form – is the core…

The Digital Cybersecurity Paradox

The Digital Cybersecurity Paradox

In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not…

In Security, Process is as Reliable as Luck

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows…