Archive for category: Cyber Security

How Risk Weighting Helps Solve the Virtualization Challenge for IoT | Part 2 of a 2-part series

By Francis Cianfrocca In our last blog, we looked at the four core aspects of IoT cybersecurity management: Asset Inventory, Systems Management, Threat Hunting, and Incident Response. These represent ...

The Core Four Aspects of IOT Cybersecurity Management | Part 1 of a 2-part series

By Francis Cianfrocca Why is IOT cybersecurity management such a black hole?  Because no single vendor has yet brought all the pieces together into a cohesive framework that addresses each phase of th...

Let’s Get Serious About Securing Cyber-Physical Systems

By Francis Cianfrocca I’m a cyber security expert. Have been for years. So are a lot of the people reading this piece. When you’re an expert conversing with experts, the substance of the conversation...

5 Key Elements of an ICS Cybersecurity Plan

5 Key Elements of an ICS Cyber Security Plan

IT operations teams frequently tell us they have no oversight or responsibility over OT systems that have IP/IT connectivity. At the same time, on the OT operations side, there are no clearly defined ...