POC vs POV part 2 featured
06.10.19

Navigating an Industrial Cybersecurity Proof of Co...

In my previous blog "Proof of Concept (POC) vs Proof of Value (POV)", March 11, 2019, I highlighted the differences between a POC and a POV. While the outputs a...

Read more
Herjavec Featured
05.23.19

Herjavec Group 2019 Cybercrime Report Takeaway: Cy...

Cybersecurity Ventures' 2019 Official Annual Cybercrime Report, sponsored by the Herjavec Group, predicts cybercrime will cost the world more than $6 trillion a...

Read more
The Security Implications of Infrastructure Modernization_Feature_May 7 2019_O
05.07.19

The Security Implications of Infrastructure Modern...

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial interne...

Read more
Debunking The Myths In ICS March 26 2019 Blog Feature
03.26.19

Debunking The Myths In ICS

Organizations involved in industrial or critical infrastructure are faced with a security challenge like never before. Whether it is the traditional hack, the i...

Read more
Featured - The $10 Million Wake Up Call
02.11.19

Three Key Ways to Ensure NERC Compliance: The $10 ...

For most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every other place in-betw...

Read more
MAIN FEATURE - MIND THE GAP - A ROADMAP TO IT2FOT ALIGNMENT
07.03.18

Mind the Gap - a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment,...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy