Nathan Kipp talks about how cryptography affects the three intertwining pillars of cybersecurity—confidentiality, integrity, and availability—at different places in a network and why some cryptographic protocols don’t belong in certain places.
Contributor
Nathan Kipp
Engineering Manager, Infrastructure Defensenathan_kipp@selinc.comView full bioContribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.
Video
Learn about zero trust, a concept gaining popularity in the cybersecurity world, from the perspective of SEL’s VP of Infrastructure Defense.
Video
Learn what cybersecurity professionals must consider when working to minimize attack surfaces.
Video
Discover why deny-by-default technology is one of the strongest ways to design secure communications paths for operational technology (OT) networks.