BLOG

InsightCyber Launches Portfolio of Managed IoT Security™ Services

FOR IMMEDIATE RELEASE ARC Industry Forum Booth #42 INSIGHTCYBER LAUNCHES PORTFOLIO OF MANAGED IOT SECURITY™ SERVICES Launch includes controlled release of NetRadar Express™, the entry-level version of...

How Risk Weighting Helps Solve the Virtualization Challenge for IoT | Part 2 of a 2-part series

By Francis Cianfrocca In our last blog, we looked at the four core aspects of IoT cybersecurity management: Asset Inventory, Systems Management, Threat Hunting, and Incident Response. These represent ...

The Core Four Aspects of IOT Cybersecurity Management | Part 1 of a 2-part series

By Francis Cianfrocca Why is IOT cybersecurity management such a black hole?  Because no single vendor has yet brought all the pieces together into a cohesive framework that addresses each phase of th...

Let’s Get Serious About Securing Cyber-Physical Systems

By Francis Cianfrocca I’m a cyber security expert. Have been for years. So are a lot of the people reading this piece. When you’re an expert conversing with experts, the substance of the conversation...

5 Key Elements of an ICS Cybersecurity Plan

5 Key Elements of an ICS Cyber Security Plan

IT operations teams frequently tell us they have no oversight or responsibility over OT systems that have IP/IT connectivity. At the same time, on the OT operations side, there are no clearly defined ...

Incident Response in IT and OT Are Two Very Different Things

Think about it – your OT environment has already been breached. But what does that really mean? Today, you can’t read a news story or blog without learning about yet another breach of some sort. But a...

Assessment Methodology in OT: How Standards Can Help You Get Started

When tasked with assessing OT cybersecurity risk in OT, many CISOs have questions about methodology. Numerous standards exist, including NIST CSF, NERC CIP, NIST 800-53, with newer ones appearing regu...

Differences Between IT and OT SOCs and How to Bring Them Together

Last month we talked about “integrated” SOCs, that bring together data from both IT and OT environments (IT SOC + OT SOC = an iSOC, December 2018). This is a powerful idea, not only because it can mul...

IT SOC/OT SOC Insight Cyber Group

IT SOC + OT SOC = an Integrated SOC (iSOC)

An Integrated SOC (or “iSoc”) is one that simultaneously collects and correlates security-relevant events from both IT and OT environments. If you’re one of the many industrial-company CISOs that are ...

When Managing OT Risks, You Need to Redefine Risk

Cyber security isn’t a business outcome. It’s a business enabler. Security by reducing risk allows business to achieve outcomes. A lot of attention is being paid to the problem of enhancing cyber secu...