Cybersecurity Musings

September 22, 2023
In today’s digital age, nearly everyone – and everything – is connected to the internet. So, it’s no surprise that...
September 7, 2023
Those who need to monitor and defend operational technology (OT) need to understand what is on their network. It doesn’t...
August 24, 2023
PCAPs (packet captures) are invaluable information sources for identifying assets and activities on a network. We’ve talked...
August 10, 2023
Vulnerability management is crucial for ensuring safety, operations, compliance, and information security in operational...
July 26, 2023
When it comes to industrial environments and maintaining operations, knowing what’s going on in your environment is a non-negotiable...
July 13, 2023
Successfully implementing a project in your OT (operational technology) environment, whether it’s for security, operations,...
June 28, 2023
The OSI (Open Systems International) model is a conceptual reference model used to describe how different devices and systems...
June 16, 2023
Internal Network Security Monitoring (INSM) is a process or solution that monitors activity on a network with the goal of...
June 2, 2023
You are off to a great start: Your organization has a network security monitoring solution deployed and configured. Traffic...
May 25, 2023
Most people in the ICS/OT space are familiar with the Purdue model as a well-known framework for organizing OT networks....