Nathan Kipp talks about how cryptography affects the three intertwining pillars of cybersecurity—confidentiality, integrity, and availability—at different places in a network and why some cryptographic protocols don’t belong in certain places.
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.
Learn about zero trust, a concept gaining popularity in the cybersecurity world, from the perspective of SEL’s VP of Infrastructure Defense.
Learn what cybersecurity professionals must consider when working to minimize attack surfaces.
Discover why deny-by-default technology is one of the strongest ways to design secure communications paths for operational technology (OT) networks.