ENERGY MANAGEMENT CONTROL SYSTEMS KEY INSIGHTS TO IMPROVE CYBER SECURITY Ensuring effective cyber security protections are in place for critical infrastructure has been a priority of US Federal agencies, including the Department of Defense (DoD), for some time. Cyber...
SECURING TRANSIENT CYBER ASSETS – 5 THINGS TO CONSIDEROne of the most difficult challenges for any security team is protecting cyber assets that frequently move from one place to another (i.e., are...
“Headlines over the past 24 months have cited security breaches in Anthem, the Philippines’ Commission on Elections (COMELEC), Wendy’s, LinkedIn, the Red Cross, Cisco, Yahoo, financial institutions around the world, and even the U.S. Department of Justice. As...
THE DANGERS OF OVERLOOKING DEVICE DRIVERS IN PATCH MANAGEMENTDrivers are software that can contain vulnerabilities. As such, it is just as important to monitor them in the same way and with the same diligence that we patch every other aspect of our...
PATCH GAP ANALYSIS – SECURING CRITICAL INFRASTRUCTUREThere is a moment when even the most seasoned IT professional’s heart stops. After a new patch or a new update is installed on some critical piece of hardware he reaches out, flips the reset switch, and waits...
VALIDATION TECHNIQUES AND GUIDELINES FOR ICSValidation is not an indefinite stamp of approval; it is “proof that something is based on truth or fact, or is acceptable.” However, a time limit is attached to any proclamation of validation and this time limit...