5 Steps to Reviving a Frankenstein Network Architecture

In Mary Shelley’s classic Frankenstein, Dr. Frankenstein builds a creature out of scavenged body parts and succeeds in bringing the creature to life. The creature goes on to try and understand its new world, but it does not function as well as Dr. Frankenstein had probably hoped. Much like the story of Frankenstein, today’s networking […]

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many […]