Tim Mullen

Reducing the Costs of Implementing Cybersecurity Policy

Threat actors looking to target your OT assets are constantly refining their processes to identify new ways to access weaknesses across your control system landscape. To prepare for this and identify cybersecurity vulnerabilities in your system, the cybersecurity policies designed to protect your programmable logic controllers (PLCs), human-machine interfaces (HMIs), and the server computers that support them need to evolve as well.

Understanding CIA in an OT environment

Any IT professional will tell you that the CIA triad is key to understanding, evaluating, and...

Implications of Log4J in your Control System

Recently across the news there has been a lot of discussion about “Log4J vulnerability” This is a...

Working with OMAC to Develop Industry Best Practices for Remote Access Security

In the past decade or so, many organizations have incorporated network connectivity into their...

Don't Let Your Remote Access Platform Be Your Cybersecurity Weakness

Today, many critical infrastructure facilities, such as water and sewage treatment plants, have...

Six Strategies for Hardening New OT PCs

Most manufacturing organizations understand the importance of implementing cybersecurity...

Understanding Your Organization’s Cyber Posture

As the plant floor becomes more connected, ensuring proper cyber protections for industrial control...