Blog Industry: Pharma Manufacturing

Testing the Limits: Inside Owl Cyber Defense’s SEER Lab

As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ev...
March 26, 2025
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack – Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury Camp H. M. Smith Aiea, Hawaii As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not rig...
March 24, 2025
John McKeon Business Development Manager - Financial Services

How Can SIEM Work with Air-Gapped Networks?

To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...
October 7, 2020
Brian Romansky Chief Innovation Officer

Vaccine-like Trials Could Allay Software Patch Concerns

A recent article from fortune.com implies that perhaps the Russian race to be the first to announce an approved vaccine for COVID-19 might circumvent the level of rigorous safety and effi...
July 28, 2020
Bill Caffery Strategic Technology Advisor

Closing the Barn Door?

According to yesterday’s NY Times (July 16, 2020) U.S. Intelligence agencies have revealed that a small but well-known hacking group associated with Russian Intelligence have been “ta...
July 17, 2020
Charlie Schick Healthcare Consultant

Protecting Information Amongst the Chaos

This week, new evidence emerged that a group linked to the Russian government, APT29 (also known as Cozy Bear), has been attacking and trying to steal COVID-19-related informati...
July 16, 2020
Time Bomb
Charlie Schick Healthcare Consultant

VxWorks URGENT/11 – When Your Reliable System is Actually a Time Bomb

What You Need to Know Eleven critical vulnerabilities were found in a leading real-time operating system (RTOS) used in many industries, by leading vendors - VxWorks. The nature and scal...
April 29, 2020
Bioreactor Demo
Charlie Schick Pharma and Healthcare Consultant

Total Geekery: Data Diode Bioreactor Demo

This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...
November 21, 2019
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
Charlie Schick Healthcare Consultant

How Will You Securely Expand Your PI System to Include Contract Manufacturers?

So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...
October 30, 2019
Charlie Schick Healthcare Consultant

A New Model for Secure IIoT Connectivity

I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
September 23, 2019
Charlie Schick Healthcare Consultant

How IIoT and the Cloud are Upending the Purdue Model in Manufacturing

The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
September 11, 2019
Charlie Schick Healthcare Consultant

Running Away is Not a Good Cyber Strategy for Ransomware

There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
July 11, 2019
Prev
1 2
Next