cybersecurity

September 22, 2023
In today’s digital age, nearly everyone – and everything – is connected to the internet. So, it’s no surprise that...
September 7, 2023
Those who need to monitor and defend operational technology (OT) need to understand what is on their network. It doesn’t...
August 24, 2023
PCAPs (packet captures) are invaluable information sources for identifying assets and activities on a network. We’ve talked...
August 10, 2023
Vulnerability management is crucial for ensuring safety, operations, compliance, and information security in operational...
July 26, 2023
When it comes to industrial environments and maintaining operations, knowing what’s going on in your environment is a non-negotiable...
July 13, 2023
Successfully implementing a project in your OT (operational technology) environment, whether it’s for security, operations,...
January 18, 2022
Part 2: Understanding ICS In part 1, we covered the basics of intelligence-based detections in ICS, primarily focusing on...
January 11, 2022
Part 1: Understanding Intelligence-Based Detections Did you just say “Intelligence-Based Detections in ICS Fail”?...
January 7, 2022
Cybersecurity Lessons from a 17th-century Belgian Fencing Master Swords and cybersecurity may seem like very different topics,...
December 21, 2021
SCADA Level 3 (the Plant Level) contains many distinct elements, some of which I touched on in my previous SCADA post. In...