Secure-by-Design

Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Vulnerabilities in GE Healthcare Vivid ultrasound system could allow malicious insiders to install ransomware, access patient data
Vulnerabilities in GE Healthcare Vivid ultrasound system could allow malicious insiders to install ransomware, access patient data
New Claroty report focuses on challenges and priorities of federal OT cyber incidents 
New Claroty report focuses on challenges and priorities of federal OT cyber incidents 
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Critical vulnerabilities in Cinterion cellular modems pose significant threat to industrial devices
Critical vulnerabilities in Cinterion cellular modems pose significant threat to industrial devices

Industrial Cyber Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Sarah Fluchs
Beyond principles: How to finally get a handle on security by design
Start making model-based cybersecurity decisions in 3 steps We have to think of an engineer who knows how... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Danielle Jablanski
Preserving Integrity in OT Systems to Defend Against Living off the Land Techniques
Living-off-the-land (LotL) techniques may reduce the time and resources required to exploit or corrupt systems – abusing stolen... Read full story