Cybersecurity Musings

March 22, 2023
Our inaugural webinar focused on the growing conversations around ICS (industrial control systems) and OT (operational technology)...
March 16, 2023
Risk assessments are a fundamental part of maintaining security protocols. Unlike formal security audits, there isn’t a...
March 3, 2023
You’ve heard it before: you can’t defend what you can’t see — and a fruitful visibility journey starts with...
February 2, 2023
To prepare against cybersecurity threats in the manufacturing industry, it remains crucial for ICS (industrial control system)...
January 11, 2023
Early morning on January 11, 2023, the group “GhostSec” made some pretty wild claims on their Telegram channel regarding...
January 5, 2023
The oil & gas, electrical, and manufacturing industries host vast and complex industrial networks. Protecting these industrial...
December 15, 2022
FUD (fear, uncertainty, and doubt) can often permeate even well-meaning discussions regarding the vulnerabilities of critical...
December 8, 2022
Much has been made of recent ransomware and cyberattacks impacting critical infrastructure – and those incidents are worth...
November 29, 2022
2022 has been a whirlwind of activity in ICS cybersecurity. As we take a step away to enjoy family, friends, and feasts during...
November 18, 2022
Continuing our look into the South Staffs Water ransomware attack from earlier this year – As we reviewed in Part 1,...