Blog Industry: ICS
Charlie Schick Pharma and Healthcare Consultant
Total Geekery: Data Diode Bioreactor Demo
This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...
Charlie Schick Healthcare Consultant
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...
Charlie Schick Healthcare Consultant
A New Model for Secure IIoT Connectivity
I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
Charlie Schick Healthcare Consultant
How IIoT and the Cloud are Upending the Purdue Model in Manufacturing
The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
Charlie Schick Healthcare Consultant
Running Away is Not a Good Cyber Strategy for Ransomware
There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
Phil Won Product Manager
Addressing the Cybersecurity Skills Shortage
Even more difficult than getting approval for an added headcount to address your cybersecurity concerns is finding the right person to fill that hard-fought opening. There are two factors...
Dan Callahan Civilian Intelligence Account Executive
What’s Changing in Cybersecurity & Why it’s Important
Technology manufacturers in the global IT market occasionally come up for air in order to revalidate that our value propositions are still germane. Essentially, we like to know that we’...
Andrew Nix Commercial Sales Consultant
Securing BSEE Real-Time Monitoring for Offshore Oil & Gas Operations
In the wake of the Deepwater Horizon disaster in 2010, the U.S. Department of the Interior launched a series of aggressive reforms in improve safety in offshore well operations. Among the...
Scott Coleman Director of Marketing / Product Mgmt.
Would You Trust Your Vendors to Protect You From a Cyberattack?
The marketing agency we use to design our cool promotional t-shirts is fun to work with – they have a totally hip workspace and even have a resident dog in their office. But do I trust ...
Phil Won Product Manager
The Importance of Routine System Updates
Raise your hand if you’ve ever felt a pang of guilt when your doctor reminded you to eat healthier and exercise more at your annual check-up. My hand is up. Of course, no one wants to l...
Garth Harrison Account Executive-Water Wastewater
America’s Water Infrastructure Act (AWIA) of 2018 – Prioritizing Cybersecurity Risk and Operational Resiliency
The recently signed America’s Water Infrastructure Act of 2018 is widely viewed as the most significant water infrastructure bill in decades. This comprehensive legislation was designed...
Dennis Lanahan Director of International Sales
How Data Diode Cybersecurity is Being Used to Protect Critical Infrastructure in the Middle East
In late 2012, there was a severe, targeted malware cyber-attack on a number of oil & gas facilities using what became known as the Shamoon virus. This Windows-based malware differed f...