Blog Industry: ICS

Cross Domain Solutions vs Firewalls
Transferring data securely between networks or systems with different security requirements is one of the fundamental challenges of cybersecurity. For a typical organization, the solution...

Solving the Data Format Problem with Daffodil
It goes without saying that to be useful anywhere, data has to be in some sort of format. But every time you start using a new data format, you have to tell your software how to use it, a...

John McKeon Business Development Manager - Financial Services
How Can SIEM Work with Air-Gapped Networks?
To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...

Brian Romansky Chief Innovation Officer
Vaccine-like Trials Could Allay Software Patch Concerns
A recent article from fortune.com implies that perhaps the Russian race to be the first to announce an approved vaccine for COVID-19 might circumvent the level of rigorous safety and effi...

Charlie Schick Healthcare Consultant
VxWorks URGENT/11 – When Your Reliable System is Actually a Time Bomb
What You Need to Know
Eleven critical vulnerabilities were found in a leading real-time operating system (RTOS) used in many industries, by leading vendors - VxWorks. The nature and scal...

Sharada Prahladrao ARC Advisory Group
ARC Advisory Group – Owl Cyber Defense Workshop on Sustainable OT Cybersecurity Strategy
Cybersecurity is now at the forefront of all deliberations in a digitally connected world. Once again an entire day at the ARC Industry Forum in Orlando featured cybersecurity worksho...

John McKeon Business Development Manager - Financial Services
Comments on the Upcoming NIST Special Publication 1800-25A
As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...

Charlie Schick Pharma and Healthcare Consultant
Total Geekery: Data Diode Bioreactor Demo
This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...

Charlie Schick Healthcare Consultant
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...

Charlie Schick Healthcare Consultant
A New Model for Secure IIoT Connectivity
I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...

Charlie Schick Healthcare Consultant
How IIoT and the Cloud are Upending the Purdue Model in Manufacturing
The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...

Charlie Schick Healthcare Consultant
Running Away is Not a Good Cyber Strategy for Ransomware
There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...