Courtesy: Verve Industrial Protection

John Livingston

Articles

Hardening acts by remediating known vulnerabilities, by positioning the system to reject certain classes of attack, and by documenting system activities. Courtesy: Maverick Technologies
System Integration August 3, 2022

Respond to growing OT vulnerabilities with endpoint systems management

A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity April 26, 2022

Adapting XDR for OT cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity February 11, 2022

Five principles for guiding OT cybersecurity governance

Five principles to establish the right operational technology (OT) cybersecurity governance model for an industrial organization can create a more secure environment.

By John Livingston
Courtesy: Control Engineering, CFE Media and Technology, www.controleng.com 
Cybersecurity February 4, 2022

Lack of qualified cybersecurity personnel for wastewater facilities

Many water, wastewater, and other critical infrastructure organizations lack OT personnel skilled in cybersecurity and this could be dangerous when facing ransomware attacks such as BlackMatter

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity January 27, 2022

Reducing risk and responding to industrial environment threats

Many industrial organizations want “visibility” or “detection” but aren’t clear on the ultimate objective or how to measure it.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity January 20, 2022

Five steps for OT endpoint security success

Organizations need endpoint security and protection to stop ransomware in its tracks, but also to demonstrate improvement and secure baselines to various stakeholders.

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity October 20, 2021

Reducing risk and responding to threats in industrial environments

Know the overall objectives of operational technology (OT) cybersecurity and to ensure progress against risk reduction and threat response. Three steps for reducing risk and threat response are highlighted.

By John Livingston
Courtesy: Verve Industrial Protection
Cybersecurity September 3, 2021

Four key steps to help your organization achieve IT-OT convergence

IT and OT teams often seem like they're in different worlds. To bring true IT security into the OT environment, here are four key steps to help organizations create IT-OT convergence.

By John Livingston
Courtesy: Verve Industrial/Coveware Quarterly Ransomware Report
Cybersecurity August 22, 2021

Managing the costs of OT cyber insurance

Cybersecurity insurance is a major aspect of risk management for many companies as attacks against operational technology increase. Four safeguards against ransomware are highlighted.

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity July 29, 2021

Companies need to reassess their cyber-physical security risk

Chief financial officers (CFOs) and audit committees need to have a radical reimagining of what cyber-physical security risk means for their organizations.

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity June 16, 2021

Benefits of a multifunction platform for IT/OT security in the age of CMMC

As the Cybersecurity Maturity Model Certification (CMMC) rolls out, it’s important for manufacturing companies to think more broadly than just CMMC. 

By John Livingston
Control Systems May 28, 2021

The importance of ICS security

Industrial control system (ICS) cybersecurity is growing in importance as cyber attacks increase and there are some basic tenets companies can follow in their journey.

By John Livingston
Cybersecurity May 18, 2021

Benefits of OT system management for cybersecurity plans

Operational technology (OT) systems and networks needs to adopt the core elements of information technology system management (ITSM).

By John Livingston
Cybersecurity February 4, 2021

What OSHA can teach us about cybersecurity

Many of the lessons and changes applied to manufacturing after the Occupational Safety and Health Act of 1970 can be applied to the growing challenge manufacturers face with industrial cybersecurity. Three keys to improving cybersecurity are highlighted.

By John Livingston
Cybersecurity September 3, 2020

How COVID-19 is affecting manufacturing cybersecurity

Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.

By John Livingston