The Mission Secure Blog

Delivering the latest in operational technology (OT) cybersecurity. Take plant, facility, SCADA and control system security to unparalleled levels.

All Blogs

Expert Interview: How low can you go? Establishing real-time protection for Level 0 and 1 assets

Author | Mission Secure

Cyber protection for Purdue Model Level 0 and 1 control system assets—that’s the topic industry veteran, Mark Baggett, discusses at the fall Industrial Control Systems Joint Working Group (ICSJWG) meeting hosted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). As he prepares for his presentation and trip, we caught up with Baggett to discuss his insights from the frontlines and today’s best practices for industrial control system (ICS) cybersecurity.

Read More

Defense in a Cyber-Physical Era: Escalating cyber attacks and inadequate protections

Author | David Dresher

Following cyber attacks on critical infrastructure and government assets in Bahrain, the Wall Street Journal reports increasing “…fears among leaders in the region that Tehran is stepping up its cyberattacks…” Iranian geopolitical tensions continue to rise across nations. With kinetic and non-kinetic actions taking place in the Persian Gulf, retaliation against U.S. government and critical infrastructure, and recent events illuminating this new era of warfare, cyber attacks on physical assets are becoming more frequent. The next era of geopolitical warfare has arrived. What now?

Read More

Do recent kinetic and cyber attacks in the Middle East and U.S. signal a next era of warfare?

Author | David Dresher

The pursuit of nuclear weapons (followed by sanctions), oil tanker explosions in the Gulf of Oman, $180 million-dollar drones shot down, cyber attacks disabling military weapons systems and counterattacks against critical infrastructure all converged the past few weeks...Has the next era of geopolitical warfare arrived, and what now?

Read More

Cyber Attacks: Assume They’re Already in the OT

Author | Paul Robertson

The day has come - the adage of “assume they’re already in and will stay in” applies to not only IT networks, but OT networks as well. Not all intruders go straight to a visible attack. High-level intruders exploit vulnerabilities, then set up conditions to maintain a state of compromise, especially in the event there is a detection. We call this persistence.

Read More