Get a Demo
    Browse by topic
    Subscribe to our news

    OT Security

    OT Security Was the Sleeper Hit of RSAC 2026

    RSAC 2026 just wrapped up in San Francisco (March 23–26), and the energy was exactly what you'd expect. Tens of thousands of security professionals packed into the Moscone Center, the hallways buzzing with demos, handshakes, and the kind of ...
    Read

    Zero Trust

    Water OT Cybersecurity in 2026: Regulations, Threats, and a Practical Path Forward

    Water utilities have operated on voluntary cybersecurity guidance for years. That era just ended.
    Read

    Why New OT Threat Groups Are Forcing a Reckoning With OT Network Security

    Three new adversary groups began targeting industrial control systems in 2025. That’s the headline finding from Dragos’ 9th Annual Year in Review OT/ICS Cybersecurity Report - and the details behind it should concern anyone responsible for securing ...
    Read

    News

    When 'Keeping Them Out' Fails: Rethinking Critical Infrastructure Security After Poland

    This blog was updated on January 28, 2026 to reflect new information reported on this attack. On December 29, 2024, almost exactly ten years after Russian hackers blacked out 250,000 Ukrainians in the first-ever cyberattack to take down a power ...
    Read

    Zero Trust

    Legacy Shadows: Illuminating Zero Trust Paths for Agencies in Brownfield Battles

    How federal agencies and their contractors can achieve Zero Trust for OT without disrupting mission-critical operations A control systems engineer is handed a mandate to achieve Target Level Zero Trust across an operational technology environment ...
    Read

    Zero Trust

    BRICKSTORM Is a Wake-Up Call: Stop What You're Doing and Protect Your DMZ

    On December 4th, CISA, the NSA, and Canadian Centre for Cyber Security dropped a joint advisory that should have every IT and security leader pulling up their network diagrams. The threat? BRICKSTORM, a sophisticated backdoor attributed to PRC ...
    Read

    Zero Trust

    CMMC Compliance Accelerated: How Zero Trust Architecture Delivers Faster Results

    The Cybersecurity Maturity Model Certification (CMMC) has fundamentally changed the cybersecurity landscape for defense contractors. With CMMC Level 2 requirements being phased into DoD contracts starting in 2025, organizations can no longer rely on ...
    Read

    Cybersecurity

    Food Manufacturing Cybersecurity | Why Segmentation Is Critical

    A Wake-Up Call for Food Manufacturing Executives The ransomware attack hit without warning. Within hours, production lines at a major food distributor ground to a halt. Three weeks later, when systems finally came back online, the damage totaled ...
    Read

    Cybersecurity

    Defend the Airport - Real-World Lessons in Aviation Cybersecurity

    I recently had the privilege of attending Defend the Airport, a leading aviation cybersecurity conference hosted by the Technology Advancement Center (TAC) in Columbia, MD. TAC is a nonprofit organization dedicated to fueling the people and ...
    Read

    Microsegmentation

    Why Utilities Need Both: The Hybrid Agent/Agentless Approach to Segmenting Modern Electric Grid Infrastructure

    In the world of cybersecurity, passionate debates often emerge about the "right" approach to microsegment critical systems. For years, vendors have staked claims on either agent-based or agentless segmentation, advocating their chosen method as the ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.