Matt Luallen


Process Safety April 16, 2013

Cyber security: Understanding spear phishing and defense techniques

Since defending against social engineering is more training than technical, your people have to learn to recognize when it’s happening.

By Matt Luallen
Process Safety January 12, 2012

Security at the device level

Individual field devices may be the target of cyber attacks. Getting that deep is a challenge, but attackers have done it.

By Matt Luallen
Process Safety January 9, 2012

Cyber security vulnerability assessment

The first step in creating an effective defense is figuring out where the vulnerabilities are in the system. This is a difficult but necessary process, and it never ends.

By Matt Luallen
All Articles