What Will Determine Near Term SBOM Vendor Wins? (Part 1)

What Will Determine Near Term SBOM Vendor Wins? (Part 1)

Last week’s article covered analysis on how the SBOM market winners will be determined by who can best play the role of middleman between the large number of ICS vendors and the even larger number of ICS asset owners. This week let’s look at what will lead to...
ICS SBOM Market Winners

ICS SBOM Market Winners

The image in this article is what I believe will determine winners and losers in the SBOM marketplace. Who will develop and implement the best business model of mediating the need for vendors to provide and asset owners to access SBOMs with VEXies. Here is my...
SBOM In OT: Near Term Wins & Long Term Work

SBOM In OT: Near Term Wins & Long Term Work

Based on the early stage venture funding, the SBOM, or software / firmware visibility and risk analysis, product segment appears to be potentially the next big thing in the OT security category. It’s in a similar place as the OT detection and visibility product...
The Differences

The Differences

Last week I was in Singapore at the CSA OTCEP event. You notice the differences between Singapore and the US as soon as you step into the airport and go through customs.  There at least three major differences that apply to a government succeeding in managing a...
What To Do About Small Companies Running Critical Infrastructure

What To Do About Small Companies Running Critical Infrastructure

Last week’s article highlighted a recent paper, Fact and Fiction: Demystifying the Myth of the 85% by Azrilyant, Sidun and Dolashvili, and focused on the fact that 85% of the US population is served by public sector water companies, not the oft quoted 85%...

CISA Shields Up – Misleading & Wise

CISA launched their Shields Up campaign in mid-February purportedly to meet the increased threat Russia posed due the war in Ukraine. From the initial release: While there are not currently any specific credible threats to the U.S. homeland, we are mindful of the...
Living With Dirty Cyber Assets

Living With Dirty Cyber Assets

The theme for S4x22 was No Limits. In my 10-minute opening of the event, I suggested one way to break free from limits is to take conventional wisdom and flip it. Look at the world as if the opposite were true. I gave three examples, and my favorite was: flipping...

Can We Share Information? (Log4j and CODESYS)

It started with Bryan Owen’s reply to a tweet. Was hoping response for Incontroller/Pipedream would have been a rally call to inventory ICS with embedded Codesys. A community approach similar to Log4j inventory could have been lead by @cisagov — bryan owen...