Tempered Networks on the Networking Podcast, ITintheD

Caston Thomas of InterWorks and Rob Goss of Tempered Networks had the opportunity to discuss “Zero Trust” and “Software Defined Parameter” with the Detroit-based podcast, ITintheD. ITintheD is a long-established weekly podcast with over 150K...

Posted on Jan 16, 2019

Employee Spotlight: Miguel Angel Velasco

 

If you had told me a year ago that our Front Desk Receptionist would come back a year later as an Inside Sales Representative, I don’t think I would have believed you. Not that he’s incapable by any means, but just because that doesn’t usually...

Posted on Jan 3, 2019

European Water Utility hit by Cryptojacking Attack

This month a European water utility found its SCADA/ICS equipment had been compromised in a cryptojacking attack. The mining attack, which happened in an unspecified utility facility, was discovered after three weeks. The attack was discovered by a...

Posted on Dec 13, 2018

The future of cybersecurity in manufacturing

Manufacturing has been aptly named a structure critical to our way of life by the Department of Homeland Security. This sector is integral to the foundation of our economic prosperity and access to goods needed for everyday life. At first glance,...

Posted on Nov 30, 2018

Four Tips for Protecting Critical Infrastructure in the Most Wonderful Time of the Year

For many—including myself—November marks an important time of the calendar year; one where friends and family gather to honor what’s most important to our communities and way of life. It’s a time where we pay particular attention to protect all the...

Posted on Nov 16, 2018

Protect Your Ships With Secure IDN

During my first visit to one of the largest cruise ships in the world, I was amazed not only with the enormity of the vessel but more so by the “logistical ballet” that occurs on each embarkment day.  With the capacity to host over 6,000 passengers...

Posted on Sep 13, 2018

DEF CON 26: The Biggest Threat To Infrastructure Is Insecure Protocols

At DEF CON 26, there were many exciting hacks and exploits demonstrated against technologies ranging from self-driving cars to voting machines.  Attendees competed to “pwn” (slang for exploit, or “own”) whatever tech they could get their hands on.

Wh...

Posted on Aug 30, 2018