Zero Trust: Protecting Critical Infrastructure and Responding to CISA’s ‘Shields Up’

There are no boundaries in cyberspace. That fact has accelerated sharing of threat intelligence across the defenders, but it exponentially raises the threat of cyberattacks. This reality is underscored by…

How to Manage Cyber Risk as Grid Modernization Efforts Intensify

A survey of chief information security officers revealed great insight on cyber risks and perceived vulnerabilities. While some insiders may think working hand-in-hand with government agencies to develop sound cyber…

Implement Cost-Effective, Zero-Trust Remote Operations to Mitigate Cyber Risks and Maintain Operational Resilience

In January 2021, a hacker accessed the digital infrastructure controlling the water supply for Oldsmar, a Florida city of 15,000 people. The bad actor attempted to manipulate the city’s water…