Combating Cyber-Attacks Through Cyber Intelligence & Security: Part One

Hello and welcome to Part One of my new blog series discussing cyber intelligence and security around the critical infrastructure sectors in the U.S. Cyber-attacks are becoming increasingly prevalent and threatening to utilities, refineries, military defense systems, water treatment plants and other sectors of our critical infrastructure. Part One of this series details the dangers […]

Challenges and Progress at the White House Summit on Cybersecurity

On February 13, I attended the White House Summit on Cybersecurity and Consumer Protection at Stanford University. President Obama, along with senior leaders spanning federal government, industry and technology sectors, law enforcement, consumer privacy advocates, and others convened to collaborate and build partnerships within the public and private sectors to further improve cybersecurity practices. The […]

Geopolitical Trends in Cybersecurity for 2015

New year predictions generally take one of several forms: broad generalizations about multi-year trends, guesses about what might happen, or overviews of recent events disguised as predictions. The first is too easy, the second—going out on a limb—risks missing the mark so badly as to be useless. So I will go with the third choice in […]

The New Face in CyberSecurity

The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner. With the Internet of Everything and cloud computing, CyberSecurity must be […]

NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security

A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped ALL security threats from penetrating the corporate network. Many of us in the industry raised our collective eyebrows in surprise at such a bold claim. While the naive or inexperienced might have believed such an outrageous claim, […]

HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments

The HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and other operational technology (OT) environments. In the case of HAVEX, the energy industry, and specifically power plants based in Europe, seems to be the primary […]

Energy Networking Convergence Part 2: Cyber & Physical Security

This is the second of a four part series on the convergence of IT and OT (Operational Technologies) by Rick Geiger Physical Security has evolved from serial communication to modern systems that are largely, if not completely, IP networked systems.  The unique requirements of physical security have often lead to shadow IT departments within the physical […]