Jeremy Morgan


HMI, OI April 19, 2021

How security by design might have stopped Oldsmar HMI attack

Oldsmar's cybersecurity attack was due to a lack of defense in depth in the human-machine interface (HMI). A good security by design protocol can help avert this, but it requires a fundamental rethink.

By Jeremy Morgan
Cybersecurity April 12, 2021

Creating a threat-informed defense for a facility

A threat scenario is shown to explain how an asset owner can benefit from leveraging diverse data collection using the MITRE ATT&CK for ICS Matrix.

By Jeremy Morgan
Cybersecurity April 5, 2021

Why cyber hygiene is needed when developing a risk-based cybersecurity approach

A risk-based approach to cybersecurity without basic cyber hygiene leads to many long-term problems for companies that are trying to get their networks safe and secure.

By Jeremy Morgan