Security Capabilities Needed for OT and IIoT Systems
My Top 10 Security Capability Recommendations for 2020 As reported in a previous article here at ActiveCyber.net, there are some major trends that are affecting the OT systems of today...
My Top 10 Security Capability Recommendations for 2020 As reported in a previous article here at ActiveCyber.net, there are some major trends that are affecting the OT systems of today...
A Growing Security Threat Against Critical Infrastructure In 2009 there were less than a billion IoT devices in use. According to Statista, that number is expected to increase to more...
Industry 4.0 Ushers In the Age of Digitalization Industry 4.0, or the fourth wave of the Industrial Revolution, leverages connectivity and autonomous operation to create robust Industrial IoT (IIoT) applications...
Over the past few years, I have been hearing a lot about the security issues and, therefore, the security requirements for Operational Technology (OT), as well as for the Internet...
I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...
I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...
My recent SOC Service Manager experience got me to thinking about cyber tool sprawl and the return on investment that my customer was getting for their cyber investment. There is...
The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best...
The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and...