Five Characteristics of an Effective Common Cybersecurity Technology Stack

This article is part of a larger piece that was published on the NETSCOUT blog. To read the original in its entirety, click HERE. The last few years have seen several far-reaching cyberattacks against our nation’s critical infrastructure and essential…

The Colonial Pipeline Hack: It’s Real, It Will Happen Again, and We Must Be Prepared

Hackers recently attacked computer systems belonging to the Colonial Pipeline company, forcing them to shut down operations and inhibiting delivery of diesel fuel, gasoline, and jet fuel throughout the East Coast of the United States.  This pipeline is not just…

The impact of the IIoT on the cybersecurity of critical infrastructure

The movement towards connected and cloud-enabled IoT devices has opened the door to many benefits and conveniences. Anyone that has turned up their heat without getting up off of their couch (and out from under a toasty blanket) will certainly…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…