Published inSystem WeaknessSecure Network Architecture Controls: Next-Gen Firewall (NGFW)When implementing or reviewing secure network architecture, Next-Gen Firewall serve as critical control in safeguarding network AND…Jun 26Jun 26
Published inSystem WeaknessPatching in Critical InfrastructureRead my previous posts on on ICS Security hereMay 27May 27
Purdue Model Relevance: Insights from A Cybersecurity ProfessionalI wrote about Purdue model and OT devices in previous blog posts. Find first article here if you haven’t read them.May 17May 17
Published inSystem WeaknessSecure Architecture: Infrastructure ControlsThis is the third part in our secure architecture series. Find second part hereMay 9May 9
Threat Intelligence 101Over the years cyber threat intelligence has become important for organizations to gather the intelligence on the intrusion organization…May 3May 3
Published inSystem WeaknessUser Controls: Secure ArchitectureThis is the second part of our secure architecture series. If you missed the Find the first part, find it here.Apr 26Apr 26
Published inSystem WeaknessSpotting the Differences: IT vs. OT EnvironmentsIn this article, I am sharing my learning about key differences in IT and ICS environment which highlights why ICS security requires a…Apr 22Apr 22
Purdue Model — Supervisory ZoneThis is the part 3 of our ICS Purdue Model series. Continuing on previous article, in this edition we will talk about Level 2 and Level 3…Apr 22Apr 22
Governance Overkill in Cybersecurity ProgramsOrganizations operating comprehensive cybersecurity initiatives have its own set of cybersecurity protocols. While governance is undeniably…Apr 22Apr 22
Published inSystem WeaknessPurdue — Field Devices and ControllersBuilding on the last ICS Cybersecurity article A Sneak Peek into Purdue Enterprise Reference Architecture , let’s learn about level 0 and…Apr 22Apr 22