Black Hat


The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk


For some organizations, the ability to communicate privately is an absolute must, even a life or death situation. For these entities, which consist mostly of government agencies, law firms, and Fortune 100 companies, critical information getting into the wrong hands can be disastrous. To give you, our readers, a glimpse […]

Allowing really important people who need to talk about really ...


Today’s endpoint positive security goes far beyond the whitelisting of yesteryear.  Sometimes called OS-Centric Positive Security, current positive security models focus on the damage stage of the attack.  While attack strategies are ever changing and are nearly unlimited, the intentions of the attacker in the damage stage remains fairly static […]

What if we become a bit more positive in the ...