


The ETHOS Of Unusual Cooperation
There was a surprising announcement yesterday in the OT detection space with the creation of the Emerging Threat Open Sharing (ETHOS) organization, open source project and development plan. Surprising because of the members. The big three in OT detection:...
Will CISA Push Finally Lead To OT Secure By Default?
Last week CISA published Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default. While most of the attention has been on Security by Design, Security by Default can be a much more immediate result and a long...
Wanted: Cognitive Diversity In OT Security
We have a diversity problem in OT security. The obvious lack of diversity is social diversity. Racial, gender and even age diversity. It’s important the community is taking this seriously and making progress. However there is another type of diversity...
Another Swing At Chat62443
A Seth Godin blog and Peter Drucker daily digest one day last week brought me back to my IEC 62443’s Future … Encyclopedia Brittanica and AI article, originally published in January 2023. The article raised the ire of many on the 62443 committee,...
New Recipe for Governments: Stop!, Hypothesis and Metric, Falsify Criteria
Governments have greatly increased the activity level on addressing OT security. Unfortunately, much, if not most, of the activity is wasted. I’ll use the US Dept of Energy’s CESER program as the example. This recipe applies to all government organizations, US and...
One-Way, One-Way
Hat’s off to the Waterfall marketing team on the buildup for their new WF-600. They treated it like a movie release with a trailer and other social media content designed to peak interest in the new product release. Part of the reason it was so...
OT Patching / Cyber Maintenance Catch-22
There was only one catch and that was Catch-22, which specified that a concern for one’s own safety in the face of dangers that were real and immediate was the process of a rational mind. Orr was crazy and could be grounded. All he had to do was ask; and as soon...
The Big Miss In The National Cybersecurity Strategy
The Biden Administration released the new US National Cybersecurity Strategy last week (fact sheet and full document). I’m still puzzled on the timing, weeks after Chris Inglis leaves as National Cyber Director, and with no replacement announced (Kemba Walden is...