Articles

Active Cyber™ Picks Top 3 Cybersecurity Challenges for 2023

As 2022 ended and we rolled into another year, I began to see the yearly editions of the top data breaches, top threats, and top privacy fines from different cyber...

Cyber Readiness Needs a Holistic Assessment Approach at the Edge

I have been seeing quite a number of references lately to the terms “cyber ready” and “cyber readiness.” Some of these references reflect an enterprise view of readiness – defined...

The Authenticity of Cyber Attribution – Who Do You Believe?

I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done...

Orchestration for OT Systems – Is the Time Right?

My journey into OT security has led me to the question of can we safely operate automated security orchestration platforms in an OT environment or a converged OT/IT environment? I...

Using MBSE and Digital Twins to Design and Evaluate Cyber Resilient Systems

This election year spurred me into researching the cyber resilience of OT / IoT systems, of which electronic election systems are a subset. I discovered there was quite a bit...

Active Cyber Surveys the Standards Landscape for OT and IoT Systems Security

A Plethora of Standards and Guidance for OT / IoT Security In my research into OT and IoT systems security, I have come across a plethora of guidance and standards...

Security Capabilities for OT and IIoT Systems – Part 2

My most recent article discussed the first 5 of my top 10 recommended security capabilities for OT and IIoT systems. Here they are again for your reference. Capability 1: Real-time...

Security Capabilities Needed for OT and IIoT Systems

My Top 10 Security Capability Recommendations for 2020 As reported in a previous article here at ActiveCyber.net, there are some major trends that are affecting the OT systems of today...

2020 – The Year of Insecurity of the Critical Infrastructure

A Growing Security Threat Against Critical Infrastructure In 2009 there were less than a billion IoT devices in use. According to Statista, that number is expected to increase to more...