AI, Threat Narratives, and the Missing Discipline of Operational Assurance
Looking past cyber narratives to protect the brass ring of process integrity and operational trust. Most of the discussion around AI in OT cybersecurity is framed in threat terms. Smarter attackers. Faster exploits. More automated reconnaissance. Better malware. Better evasion. It’s a familiar way to talk about the problem, but it leaves too
Key Cybersecurity Risks for Network Clocks
Office time zone wall clocks, often used to display local times for international teams Multi-zone digital time clocks seem harmless, but in modern environments (airports, ports, SOCs, NOCs, offices) they can introduce real cybersecurity and operational risks. Here’s a clean breakdown, from practical to often-overlooked. 1. Network-Connected Clocks (Primary Risk) Many modern
Why OT Cybersecurity Struggles to Prove Its Value
Over the years, I’ve had a front-row seat to how close OT cybersecurity has come to addressing some of its hardest problems. Not because of a lack of capable vendors or thoughtful engineers. Quite the opposite. Many of the technical building blocks have existed for some time, often in plain sight. What was

