POC vs POV part 2 featured
06.10.19

Navigating an Industrial Cybersecurity Proof of Co...

In my previous blog "Proof of Concept (POC) vs Proof of Value (POV)", March 11, 2019, I highlighted the differences between a POC and a POV. While the outputs a...

Read more
Herjavec Featured
05.23.19

Herjavec Group 2019 Cybercrime Report Takeaway: Cy...

Cybersecurity Ventures' 2019 Official Annual Cybercrime Report, sponsored by the Herjavec Group, predicts cybercrime will cost the world more than $6 trillion a...

Read more
The Security Implications of Infrastructure Modernization_Feature_May 7 2019_O
05.07.19

The Security Implications of Infrastructure Modern...

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial interne...

Read more
LockerGoga Blog Post April 2019_Featured
04.19.19

In LockerGoga’s Aftermath: 3 Guiding Principles fo...

Not quite a month ago LockerGoga took industrial operations of a major aluminum producer offline; that much we know. What is not known by many is that LockerGog...

Read more
Debunking The Myths In ICS March 26 2019 Blog Feature
03.26.19

Debunking The Myths In ICS

Organizations involved in industrial or critical infrastructure are faced with a security challenge like never before. Whether it is the traditional hack, the i...

Read more
POC vs POV Blog March 2019_Thumbnail
03.11.19

Proof of Concept (POC) vs Proof of Value (POV)

There is a bit of debate over whether a POC is the same as or interchangeable with a POV. Commonly, the terms are used to mean the same thing, but in fact they’...

Read more
Featured - The $10 Million Wake Up Call
02.11.19

Three Key Ways to Ensure NERC Compliance: The $10 ...

For most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every other place in-betw...

Read more
Cracking The Code On OT Security - thumbnail
02.05.19

Cracking The Code On OT Security

Active is probably the biggest buzzword nowadays in the field of industrial cyber security. But what is it? How does it work? Is it safe? Do I even need it?

Read more
Best Practices to Creating the Best OT Ruleset _thumbnail
01.02.19

Best Practices to Creating the Best OT Ruleset

While it is not a new target, many experts say that 2019 is shaping up to be the year of industrial cyber security. A confluence of factors has put OT networks ...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy