Kevin
-
Recent Posts
- SOC Book Published
- The Power of Digital Twins in the Cybersecurity Mesh
- “Interweaving the Strands of AI and SOAR onto the cybersecurity mesh: A Deep Dive into the Cybersecurity Mesh and its Role in Modern Digital Defense Strategies”
- “Mastering the Interplay: The Role and Culture of a Cyber Physical Security (CPS) Professional in Global Cybersecurity Teams”
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
Archives
- October 2023
- September 2023
- July 2023
- June 2023
- May 2023
- April 2023
- February 2023
- January 2023
- July 2022
- May 2022
- April 2018
- February 2018
- June 2017
- September 2016
- March 2016
- February 2016
- December 2015
- April 2015
- February 2015
- November 2014
- October 2014
- September 2014
- March 2014
- December 2013
- October 2013
- March 2013
- November 2012
- October 2012
-
Category Archives: Critical Manufacturing Cyber Security
SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
The rapid proliferation of IoT devices within corporate infrastructures has left organizations more vulnerable than ever to cyberattacks. It is essential to adopt a comprehensive approach that incorporates various techniques, tools, and emerging technologies, such as AI and ML, to … Continue reading
Posted in Critical Manufacturing Cyber Security
Tagged compliance, cyber security, Cyber Security Incident Response, cybersecurity AI, cybersecurity IoT, Cybersecurity ML, Cybersecurity SOAR, information assurance, information security, information system security, risk assessment, Security
2 Comments
The Office of No, Really?
Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, cyber warfare, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, IT operations, leadership, risk, risk assessment, risk management, Security
Leave a comment
Critical Manufacturing Legacy Systems
One common item that information Security Professionals working in Critical Manufacturing environments have to deal with is that of legacy systems. You see, in Critical Manufacturing environments it is very common for the systems that run … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged compliance, cyber, cyber security, Cyber Security Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, risk assessment, risk management, Security
Leave a comment
Critical Manufacturing Cyber Security Defense Program – A Starting Look
Cyber security professionals are often tasked with trying to defend more than they have the resources to defend. This is especially true in the area of Critical Manufacturing as there tends to be a strong desire to protect everything. In … Continue reading