Cybersecurity Musings

May 20, 2026
For this week’s article, I wanted to share a scrappy, starter-gear approach to CIP-015 compliance and  internal network...
May 14, 2026
Perimeter defenses got you through the early game, and east-west traffic is the stage that matters next. Most OT security...
May 7, 2026
The OT analyst role is changing, and the teams that understand that shift early will be better prepared for what comes next....
April 29, 2026
This is Part 1 of a 2-part blog series focused on AI vulnerability discovery in OT. Anthropic’s Claude Mythos Preview...
April 24, 2026
Why checking every R1 through R3 box doesn’t mean you’ll catch anything real. If you’re scoping CIP-015...
April 9, 2026
Sorting through the growing volume of vulnerabilities, patches, advisories, and alerts can be challenging for larger dedicated...
April 2, 2026
How can you detect malicious or anomalous activity at the edge of your network, when your environment includes a pipeline...
March 26, 2026
PCAPs (packet captures) are invaluable information sources for identifying assets and activities on a network. We’ve talked...
March 18, 2026
If you’re a technologist, especially if you’re coming from IT into OT, you probably already know your way around...
March 12, 2026
If you’re an OT operator or defender, some of the most beloved movies of all time can seem like horror flicks. Not...