Blog Industry: Network Security
Cybersecurity Secrets, Courtesy of the Russian FSB
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...
Dennis Lanahan VP, Critical Infrastructure
Cybersecurity for Renewable Power Generation
The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry follows strict guidelines for securing networks and devices that c...
Elevating the Federal Cybersecurity Discussion
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense, civilian and intelligence agencies. ...
Best Practices for OT-to-Cloud Connectivity
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset...
Reliable Cybersecurity for Oil and Gas Pipelines
No one wants to repeat the week-long Colonial Pipeline shutdown, or—even worse—see a critical infrastructure cyber attack that manages to infiltrate a pipeline’s operational technol...
Air-Gapped Networks and Data Diodes
An air gap is the ultimate cybersecurity measure: a physical separation between a secure network and any other computer or network.
The purpose of an air gap is to eliminate any poss...
Dan Crum
Common Criteria Evaluation Assurance Level and Data Diodes
As the world’s #1 provider of data diode technology, we field a lot of questions about Common Criteria (CC) and its “Evaluation Assurance Levels” (EAL) of certification, from EAL1 t...
Cross Domain Security for Critical Infrastructure
Cybersecurity has always been a key concern in the critical infrastructure sector. But in 2021, security is taking on even greater importance, due to the convergence of two factors: the g...
Webinar: The Critical Value of Hardware-Based Security
In critical infrastructure, there’s no room for inherently vulnerable cybersecurity solutions. The hacker community has spent decades developing ways to exploit commercial software ecos...
Scott Coleman Vice President of Marketing
7 Myths About Data Diodes
Not sure what you should believe about data diodes?
It’s no surprise—manufacturers of “unidirectional gateways” and other inferior technologies have done their best to create c...
Brian Romansky Chief Innovation Officer
A New Paradigm: OT Security and Data in the Cloud
Many industries have seen significant improvements in operational efficiency and reduced downtime by adopting advanced analytics and optimization algorithms that run on cloud services.
...
The Oldsmar Water System Attack: What It Can Teach Us
Last week’s attack on the Oldsmar, Florida, water system demonstrated that critical infrastructure operations are under constant threat of cyber attacks, and that a successful attack ca...