The Cybersecurity Canon: The Internet Police: How Crime Went Online, and the Cops Followed

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  […]

Continue Reading

Here Are 5 Common Pitfalls in ICS Security – And What to Do About Them

As cyberthreats increase in both volume and sophistication, securing industrial control systems (ICS) becomes that much more challenging. Despite the varied nature of critical infrastructure, however, most weaknesses in current ICS security fall into one or more of five categories. Let’s look at these ICS security pitfalls and how to address them. Weak passwords Where […]

Continue Reading
%d bloggers like this: