Security Eco-system, Creative Holistic Solutions


As we have laid the groundwork over the last year and a half of publications focused on Security Management for Critical Infrastructure, we can now start to link some solid solution details. This article is the first part of a multi-part release which will outline the component and access features … [Read more...]

Video Training sessions from ICS-ISAC #SARACon

First of all I wanted to thank those who attended these sessions live at ICS-ISAC #SARACon.  I enjoyed your input and thank you for the stimulating conversations and questions.  I also apologize for a mix up on the first session as I forgot to turn on my lapel audio feed. The first session … [Read more...]

How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?


I have been asked this a few times, so I thought I would post my response.......... During my time working for a TPM manufacturer, we worked extensively on TPM adoption which seemed to be stagnant with the saturated growth phase of the PC industry. The thought at first was to achieve market … [Read more...]

New Course Release – Security Management for Critical Infrastructure


Check out our exciting new release Security Management for Critical Infrastructure , the first two courses in this series are now available online to take online at your own pace. Gain a deep understanding of topics which have been the featured in the highly circulate publications by cyber security … [Read more...]