Killing the Cyber Kill Chain

Over the course of my career I have become familiar with many of the different ways that hackers and other bad actors can penetrate an IP network. With the growing sophistication of these cyber criminals, I hear more and more customers talk about the need to implement a  Cyber Kill Chain (CKC) strategy for when their network gets compromised. Though there is some controversy about the specifics of the CKC model, there is little argument that we need an effective way to quickly analyze and address cyber-attacks when they occur.

Beating the “500 – Three – Zero” Challenge at a Fraction of the Cost

I love customers who are delighted with our solution, and we’re getting more and more of them all the time. For example:

One of our customers is a large public university system that had the challenge of securely connecting BACnet systems in over 500 buildings across the state. Adding to the difficulty, they had an extremely tight 3-month timeline, could add zero headcount and had only a limited budget to work with.

Network Convergence: Aligning IT and OT Has Never Been Easier

A potential customer recently told me a frightening story. The IT department spent weeks planning, and configuring the IP network for new high-speed printers in the finance department. When they went to install the printers, all they received was a networking error. Simultaneously, across campus, the network connected elevators in another building went haywire. All because of an IP conflict between the printers and the elevators. Imagine if the elevators were in a hospital and full of patients. The scenario is scary, and all too real in the age of converged networks.

A Story Inspired by Frustration

How my company’s HIPrelay platform got me addicted to my Synology and less reliant on cloud storage

Overlay Policy enabling all clients to connect to Synology

Sitting in the beautiful Fairmont Hotel in Makati, Philippines, I found myself reflecting on what at first seemed like an odd topic for a blog: the joy and frustration of cloud storage.

Keeping the lights on with secure segmentation

Our buildings and infrastructure are getting smarter and more responsive by the day with all sorts of integrated sensors and access controls. Just recently, I was sitting in a park in New York City late one evening when a well-appointed businessman came up to me and asked me what color I’d like the Bank of America Tower lights to be. I threw out "purple" and the tower immediately illuminated to bright purple, by way of his smart phone that controlled the facility’s building automation systems.

You gotta give to grow, so thank you to the SANS ICS survey participants! - Part 2

I had a very timely and relevant call immediately after the SANS ICS Security webinar. I had the good fortune to speak with one of our new customers who just deployed Tempered Networks’ platform. I was interviewing them in order to understand their experience with our products so we can continually improve what we do and how we do it. I love talking to customers because (a) they’re smarter than me, and (b) I always learn something from them because of (a).