Syndicated Blog

The%20Mission%20Secure%20Blog
The Mission Secure Blog. Delivering the latest in operational technology (OT) cybersecurity. Take plant, facility, SCADA and control system security to unparalleled levels.
Rough Seas: Overcoming the Challenges of Cybersecurity for Offshore Infrastructure

Rough Seas: Overcoming the Challenges of Cybersecurity for Offshore Infrastructure

| | OT Protection
 In the world of cybersecurity, few environments present as many challenges as oil platforms and other offshore infrastructure assets. These installations, often situated in harsh and isolated marine environments, are critical to ...
Building an OT Asset Inventory: How Mission Secure Does It

Building an OT Asset Inventory: How Mission Secure Does It

| | OT Protection
 An accurate, up-to-date asset inventory is the foundation for all OT cybersecurity. Together with an OT network map, the asset inventory provides a comprehensive view of the industrial environment and is the ...
“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity

“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity

| | OT Protection
 One way to characterize a cybersecurity strategy is by whether it takes action based on the definition of “known good” activity or “known bad” activity. The “known bad” approach attempts to identify ...
Cybersecurity for traffic and transportation systems: What can we learn from NERC CIP and IMO?

Cybersecurity for traffic and transportation systems: What can we learn from NERC CIP and IMO?

| | OT Protection
 From traffic operations centers and Advanced Traffic Management Systems (ATMS) to field signal cabinets and traffic control devices, transportation systems use digital and automated components to manage physical processes—the flow and control ...
Securing Transportation and Smart Mobility Systems: a Case Study from the ARC Industry Forum

Securing Transportation and Smart Mobility Systems: a Case Study from the ARC Industry Forum

Mission Secure was happy to return to one of our favorite events, the ARC Industry Forum, in 2023. Over four days in Orlando, our team had the opportunity to meet hundreds of ...

Zero Trust for Operational Technology: 6 Key Considerations

| | OT Protection
 Zero Trust has become the dominant paradigm for IT security, influencing how organizations around the world design their networks and grant access to systems and data. In fact, the Zero Trust concept ...

An Elevator Ride with Mission Secure

Every company has an elevator pitch. But what if your building doesn't have an elevator? What if you work from home? We don't want you to miss out on our elevator pitch, ...

PIPEDREAM Malware: Understanding and Mitigating the Threat

The last year has brought unprecedented attention to the cybersecurity risks facing operational technology and industrial control systems. CISA’s new alert on APT Cyber Tools Targeting ICS/SCADA Devices adds even more urgency ...

Civil Defense 2.0

We have been witnesses to the escalation of tension in Eastern Europe for months now. Many were taken by surprise when on 23rd February Russia took military action against Ukraine. But Air ...
Microsoft security

Best of 2021 – Worldwide Hack: Microsoft Exchange Server Zero-Day Exploits

Hundreds of thousands of worldwide organizations are newly hacked via holes in Microsoft’s email software per a Krebs on Security article posted March 5, 2021. “At least 30,000 organizations across the United ...