Articles / Monthly Archive for May 2017

Ed Amoroso summarizes a technical discussion with Lior Frenkel of Waterfall Security on the use of unidirectional gateways for ICS security. #CyberSecurity ...read more

on 31 May 2017

Ed Amoroso describes the clever use of blockchain in the Manifold data access control platform. #CyberSecurity ...read more

on 26 May 2017

Ed Amoroso @hashtag_cyber outlines the MSI platform approach to securing the OT/IT interface used by IoT devices. #CyberSecurity #IoT ...read more

on 18 May 2017

Ed Amoroso asks Faizel Lakhani of SS8 to share his insights into the use of access and advanced analytics to support investigations and enterprise security. #CyberSecurity ...read more

on 16 May 2017

President Trump's recent Executive Order on Cyber Security focuses too much on report writing and not enough on real action. #CyberSecurity ...read more

on 16 May 2017

Ed Amoroso summarizes the four initiatives required to effectively reduce the risk of destructive malware attacks such as ransomware. #CyberSecurity ...read more

on 14 May 2017