Our Platform

    Protect and safeguard your OT network and operations with the industry's most advanced, most capable cybersecurity platform.

    Learn More

      icon for visibility

      Asset and Network Visibility

      Discover and visualize every asset and every network connection in your OT environment.

      icon for policy enforcement

      Policy Enforcement

      Segment your network and enforce granular policies for true Zero Trust cybersecurity.

        icon-alert

        Anomaly and Threat Detection

        Identify unexpected or unauthorized activity, from Level 0 signals to cloud connections.

        icon for signal integrity

        Signal Integrity Validation

        Monitor physical process signals to detect threats and prevent system damage.

          Mission Secure Platform Overview

          Learn More

            Industries

            Keep your organization secure against cyber threats and take control of your OT network.

            View All Industries

              A Comprehensive Guide to Maritime Cybersecurity

              Learn More

                Resources

                Find helpful OT and ICS cybersecurity resources, guides, and downloads.

                View All Resources

                  eBook: A Comprehensive Guide to OT Cybersecurity

                  Read More

                    About Us

                    Our team of world-class OT, IT, and cybersecurity experts are setting the standard in OT cyber-protection.

                    Learn More

                      Cyber Risk: From a Hacker's Point of View

                      Listen Now
                        1 Min Read

                        Security Boulevard | Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call

                        Written by Mission Secure News Desk

                        December 17, 2020


                        Security Boulevard features Paul Robertson and Weston Hecker's analysis of the massive SolarWinds cyber-attack, Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call.

                        Fitting for a tumultuous year, 2020 is coming to an end with a notable event in cyberspace: a massive cyber-attack.

                        What began as a nation-state hack of a leading IT cybersecurity firm, FireEye, has since unfolded into a massive cyber-attack hitting various parts of the U.S. government and private sector industries. And many believe this is just the tip of the iceberg as more is discovered and revealed about the SolarWinds supply chain attack.

                        Let there be no mistake; SolarWinds and its customers are victims of this attack. But the current climate of almost unlimited cyber warfare is the true root problem here. And should serve as a wake-up call across digital and physical realms.

                        Read the original article, Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call.

                        Read More


                        About the Authors:
                        Weston Hecker
                        is a cyber evangelist and ethical hacker with over a decade of pen-testing and 14 years of experience in cybersecurity research and programming. Weston works with organizations on their cybersecurity strategies, including leaders in the oil and gas, chemicals, maritime and defense sectors. A regular on the cybersecurity circuit, he has delivered over 50 presentations ranging from industry-leading events to regional conferences and universities. Notable events include Blackhat, Defcon, ISC2-Security Congress, SC-Congress, BSIDESBoston and TakedownCON. His work with universities includes projects and training such as the "Hacking Oil Rigs for Profit" event at the University of Houston and a major university project with DHS. Weston attended school in Minneapolis, where he studied Computer Science and Geophysics.

                        Paul Robertson serves as the Director of Cybersecurity at Mission Secure, where he assists with technical initiatives, including red teaming, cyber assessments, and product hardening. He is a seasoned IT security professional with over 30 years of progressive experience in information technology, communications, and information security. Paul brings deep experience with various systems, software, hardware, and technologies ranging from simple controllers to video editing to encryption. Paul's expertise spans firewalls, computer forensics, information security services, networking, cyber-physical systems, and more. In addition to co-founder and leadership roles at several technology companies, Paul served for four and a half years in the U.S. Army, including several years in the White House, providing computer and telecom support to the President and his senior national security leadership team.

                        Interested in learning more? Send us a message.