Cybersecurity Musings

August 28, 2025
The OSI (Open Systems Interconnection) model describes how different devices and systems communicate with each other. The...
August 20, 2025
Internal Network Security Monitoring (INSM) is a process or solution that monitors activity on a network with the goal of...
August 14, 2025
You are off to a great start: Your organization has a network security monitoring solution deployed and configured. Traffic...
August 6, 2025
Most people in the ICS/OT space are familiar with the Purdue model, formally known as the Purdue Enterprise Reference Architecture...
August 1, 2025
Large Language Models (LLMs) and public chatbots are revolutionizing the tech industry. LLMs are accelerating coding, helping...
July 25, 2025
If you’ve worked in or adjacent to OT, you’ve most likely heard the term IT/OT convergence. And though the industry...
July 17, 2025
Visibility into industrial asset behaviors, threat detection, and baseline deviations has reached a pivotal point with critical...
July 9, 2025
In both the information technology (IT) and industrial control system / operational technology (ICS/OT) spaces, there is...
July 3, 2025
Cloud-based services have become ubiquitous, and this includes operational technology (OT) environments. While there are...
June 25, 2025
In the never-ending quest for visibility and security in your industrial control system (ICS) environment, you’ve probably...