Archive for category: IoT Security

Let’s Get Serious About Securing Cyber-Physical Systems

By Francis Cianfrocca I’m a cyber security expert. Have been for years. So are a lot of the people reading this piece. When you’re an expert conversing with experts, the substance of the conversation...

5 Key Elements of an ICS Cybersecurity Plan

5 Key Elements of an ICS Cyber Security Plan

IT operations teams frequently tell us they have no oversight or responsibility over OT systems that have IP/IT connectivity. At the same time, on the OT operations side, there are no clearly defined ...

Incident Response in IT and OT Are Two Very Different Things

Think about it – your OT environment has already been breached. But what does that really mean? Today, you can’t read a news story or blog without learning about yet another breach of some sort. But a...

Differences Between IT and OT SOCs and How to Bring Them Together

Last month we talked about “integrated” SOCs, that bring together data from both IT and OT environments (IT SOC + OT SOC = an iSOC, December 2018). This is a powerful idea, not only because it can mul...

IT SOC/OT SOC Insight Cyber Group

IT SOC + OT SOC = an Integrated SOC (iSOC)

An Integrated SOC (or “iSoc”) is one that simultaneously collects and correlates security-relevant events from both IT and OT environments. If you’re one of the many industrial-company CISOs that are ...

Blog | Straight Thoughts on Tackling IoT CyberSecurity – at Scale

A lot of smart people are changing the way we think about cybersecurity. Much of this comes from the novel security challenges in the rapidly growing domain known as the Internet of Things. But the id...