


Volt Typhoon Is New Status Quo For ICS
Note: this article was triggered by a Dragos report and briefing Tuesday on Volt Typhoon (they call it VOLTZITE) and its potential future impact on cyber/physical systems. The real message, the key takeaway on Volt Typhoon for those running critical infrastructure ICS...
SEC Fines, Software Liability & Possible Consequences
Actions have consequences, intentional and unintentional. Last year the SEC provided specific cybersecurity disclosure rules. the Commission adopted final rules that will require public companies to disclose both material cybersecurity incidents they experience...
Support Vendor Laptops Continue To Be A Challenge
Most asset owners who have been working on OT security for 5+ years have dealt with the removable media risk. My preference is USB drives and other media dedicated to the OT environment; never used on another network. All needed software / firmware is brought through...
OT Security Unicorns
Aileen Lee coined the term Unicorn ten years ago. Unicorn: a VC-backed startup that has grown to be worth $1B+ within ten years. Aileen, now the Founder & Managing Partner of Cowboy Ventures, recently wrote the worth reading article Welcome...
Autonomous AI – – Understand The Future You Will Need To Secure and Defend
Guess the topic that produced the most S4x24 proposed sessions? AI, of course. All of the proposed sessions were on how GenAI, and other AI, would help cyber attackers and defenders. We selected two of these (more info below the line). It’s important. What also...
US Government: Guidance, Regulation, or Services?
There has been a deluge of guidance and services, and a growing desire to regulate, coming from the US Government in the last two years. A portion of that has been aimed at OT and ICS security. CISA has led the way in volume since Jen Easterly became Director. The...