<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2092100&amp;fmt=gif">
    Browse by topic
    Subscribe to our news

    Zero Trust

    Zero Trust: The New Standard for Critical Infrastructure

    The Growing Stakes for Critical Infrastructure Cyber threats to critical infrastructure are no longer theoretical. Just last week, the FBI and Cisco raised alarms over Russian-linked hackers exploiting a legacy Cisco vulnerability to infiltrate ...
    Read

    Cybersecurity

    Protecting District Attorney Offices from Data Breaches

    The Rising Threat Sadly, no one is exempt from the rise of ransomware and data exfiltration, not even Courts or District Attorney’s offices. Whether a big public spectacle or a small intrusion that is caught before serious damage, the plain fact is ...
    Read

    Cybersecurity

    Defend the Airport - Real-World Lessons in Aviation Cybersecurity

    I recently had the privilege of attending Defend the Airport, a leading aviation cybersecurity conference hosted by the Technology Advancement Center (TAC) in Columbia, MD. TAC is a nonprofit organization dedicated to fueling the people and ...
    Read

    Cybersecurity

    IT vs OT: A Comprehensive Guide

    In today's rapidly evolving industrial landscape, the lines between Information Technology (IT) and Operational Technology (OT) are blurring like never before. For decades, these two domains operated in separate silos, each with distinct purposes, ...
    Read

    Microsegmentation

    Why Utilities Need Both: The Hybrid Agent/Agentless Approach to Segmenting Modern Electric Grid Infrastructure

    In the world of cybersecurity, passionate debates often emerge about the "right" approach to microsegment critical systems. For years, vendors have staked claims on either agent-based or agentless segmentation, advocating their chosen method as the ...
    Read

    Cybersecurity

    Critical Infrastructure Protection: What It Is and Why It Matters to Utilities

    In an era of increasing cyber threats, protecting critical infrastructure - like power grids, water systems, and pipelines - is no longer optional. For utility providers, it’s the foundation of operational continuity and national security. But what ...
    Read

    Cybersecurity

    The Role of ZTNA and Microsegmentation in Cybersecurity

    Zero Trust Network Access (ZTNA) and microsegmentation are two of the most popular tools shaping next-generation cybersecurity. However, organizations typically treat these as two separate initiatives to be implemented and managed by two separate ...
    Read

    Securing Vendor Access: The Hidden Vulnerability in Utility Cybersecurity Strategy

    In the complex ecosystem of utility operations, one of the most significant yet frequently overlooked risks lies not within your organization's perimeter, but across your expansive network of third-party vendor relationships. Recent security ...
    Read

    Cybersecurity Frameworks: Key Features and Benefits

    A look at recent headlines proves that no industry is safe from ransomware attacks and sophisticated cyberattacks. These threats—and those still being crafted by creative attackers—continue to keep cybersecurity professionals awake at night. That’s ...
    Read

    Beyond Compliance: How Volt Typhoon Is Rewriting the Rulebook for Utility Cybersecurity

    When major U.S. utilities began discovering unauthorized access in their operational systems in early 2023, initial investigations suggested routine compliance issues. The reality, however, was far more concerning: a sophisticated state-sponsored ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.