EnergySec’s new white paper, “Network Perimeter Defense: Common Mistakes,” has now been released. Read the paper for tips on how to some common mistakes that happen in designing a network perimeter. Abstract: ...
Our new white paper, “Network Perimeter Defense: Analyzing the Data,” has now been released. Read the paper for tips on how to improve your data collection and analysis capabilities. Abstract: An organization or security analyst can quickly become overwhelmed with monitoring logs and responding to security alerts. One problem is that, in order to be thorough, […]
The new EnergySec white paper, “What Information to Collect at the Network Perimeter,” is the second in our series on Network Perimeter Defense. This paper provides guidance on what information to collect in order to make your monitoring and logging program more beneficial. Executive Summary: There is an almost never-ending supply of information that can be collected […]
The new EnergySec white paper, “Network Perimeter Defense: ‘The Perimeter is Dead’ Should be Laid to Rest,” is the beginning of a series of white papers, technical documents, and how-to articles. This paper introduces the series, and examines how perimeter defense applies to various cybersecurity frameworks and regulations such as NIST standards, the NERC CIP […]
“Operators and engineers are generally tasked with one thing: uptime. Service availability is king and that often comes at the expense of patching systems, for example, that might require a service to be temporarily taken down. The processes for monitoring and analyzing incidents are even less refined, experts say. That’s the gap Scott Weston sought […]
Partnered with: Abstract Listen to Oxford Computer Group (OCG), Microsoft, EnergySec and other utility security experts in this panel discussion exploring how Microsoft can strengthen your internal compliance and identity systems. Access control and data protection in relation to identities using Bulk Electric System (BES) cyber systems that must be protected represent a major component of NERC CIP V5 requirements. […]