Category: Uncategorized
Dennis Lanahan Director of International Sales
How Data Diode Cybersecurity is Being Used to Protect Critical Infrastructure in the Middle East
In late 2012, there was a severe, targeted malware cyber-attack on a number of oil & gas facilities using what became known as the Shamoon virus. This Windows-based malware differed f...
Garth Harrison Account Executive-Water Wastewater
How Digital Transformation is Changing Water and Wastewater Cybersecurity
Industries that once had their IT and OT (operational technology) networks siloed are realizing the growing pains of the connected, digital world. Present day OT networks have a growing r...
Mark Toussaint Product Manager
ReCon: A New Chapter | Embrace the Value of Secure Two-way Communication
I recently attended the DistribuTECH and OSIsoft PI World, as an exhibitor and a speaker, and I had a number of great conversations with attendees about cybersecurity in the industrial, c...
Scott Coleman Director of Marketing / Product Mgmt.
Implementing DHS Best Practices to Secure Industrial Control Systems
Modern advancements in industrial control systems (ICS) enable marked improvements in efficiency, production, reliability, and safety, all through increased use of “smart” assets and...
Scott Coleman Director of Marketing / Product Mgmt.
One-Way Data Flow, Secured by Design
Let's address the news.
We thought long and hard on what to write about for our first blog post. It’s a special milestone! But it was inevitable that we address the current news headli...