Articles

Cyber Readiness Needs a Holistic Assessment Approach at the Edge

I have been seeing quite a number of references lately to the terms “cyber ready” and “cyber readiness.” Some of these references reflect an enterprise view of readiness – defined...

The Authenticity of Cyber Attribution – Who Do You Believe?

I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done...

Trust in the Digital Economy – What Will 2022 Bring?

I see an overabundance of security and trust challenges as we turn the page on 2021 and move onto 2022. The challenges of 2022 will start off being much like...

Orchestration for OT Systems – Is the Time Right?

My journey into OT security has led me to the question of can we safely operate automated security orchestration platforms in an OT environment or a converged OT/IT environment? I...

Using MBSE and Digital Twins to Design and Evaluate Cyber Resilient Systems

This election year spurred me into researching the cyber resilience of OT / IoT systems, of which electronic election systems are a subset. I discovered there was quite a bit...

Active Cyber Surveys the Standards Landscape for OT and IoT Systems Security

A Plethora of Standards and Guidance for OT / IoT Security In my research into OT and IoT systems security, I have come across a plethora of guidance and standards...

Security Capabilities for OT and IIoT Systems – Part 2

My most recent article discussed the first 5 of my top 10 recommended security capabilities for OT and IIoT systems. Here they are again for your reference. Capability 1: Real-time...

Security Capabilities Needed for OT and IIoT Systems

My Top 10 Security Capability Recommendations for 2020 As reported in a previous article here at ActiveCyber.net, there are some major trends that are affecting the OT systems of today...

2020 – The Year of Insecurity of the Critical Infrastructure

A Growing Security Threat Against Critical Infrastructure In 2009 there were less than a billion IoT devices in use. According to Statista, that number is expected to increase to more...