News

Home News
The IT/OT Security Gap: Why Heavy-Handed Controls Fail in Manufacturing
  • By : Don Wells
  • cybersecurity
  • Comments Off on The IT/OT Security Gap: Why Heavy-Handed Controls Fail in Manufacturing

The IT/OT Security Gap: Why Heavy-Handed Controls Fail in Manufacturing

How designing security for human behavior, not against it, builds resilience During a recent cybersecurity assessment at a water utility, my team discovered something common across many operational environments: unmanaged hubs and personal devices quietly integrated into daily operations....

Read More
What a Puppy Can Teach Us about zero trust
  • By : Don Wells
  • cybersecurity
  • Comments Off on What a Puppy Can Teach Us About Zero Trust

What a Puppy Can Teach Us About Zero Trust

Zero trust may sound like the latest buzzword, but the idea has been around for years. In the old days, cybersecurity was like building a castle: a strong wall (the firewall) kept outsiders away, and once you were inside,...

Read More
Cybersecurity Maturity: The Business Advantage Many Defense Contractors Overlook
  • By : Don Wells
  • cybersecurity
  • Comments Off on Cybersecurity Maturity: The Business Advantage Many Defense Contractors Overlook

Cybersecurity Maturity: The Business Advantage Many Defense Contractors Overlook

For defense contractors, a single cyber incident can lead to more than just downtime; it can jeopardize crucial contracts. Unfortunately, cybersecurity is often viewed merely as a checkbox—an obligatory task to complete rather than a strategic investment. This mindset...

Read More
Cybersecurity in the Water Sector: 6 Must-Know Facts for Utilities
  • By : Don Wells
  • cybersecurity
  • Comments Off on Cybersecurity in the Water Sector: 6 Must-Know Facts for Utilities

Cybersecurity in the Water Sector: 6 Must-Know Facts for Utilities

As cyber threats increasingly target critical infrastructure, water and wastewater utilities—often operating with lean resources—are becoming attractive targets for cybercriminals. From ransomware attacks to unauthorized OT access, the risks are real and growing. Here are six essential cybersecurity insights...

Read More
How Cybersecurity Affects Company Valuation During M&A
  • By : Don Wells
  • cybersecurity
  • Comments Off on How Cybersecurity Affects Company Valuation During M&A

How Cybersecurity Affects Company Valuation During M&A

Would you buy a company if you knew its data was exposed to hackers? Cybersecurity isn’t just an IT concern—it’s a financial and strategic factor that can make or break a merger or acquisition deal. For small and mid-sized...

Read More
ybersecurity Is Not Just About Tools—It’s About Changing Culture
  • By : Don Wells
  • cybersecurity
  • Comments Off on Cybersecurity Is Not Just About Tools—It’s About Changing Culture

Cybersecurity Is Not Just About Tools—It’s About Changing Culture

Access to clean, safe water is a foundation of public health, economic stability, and national security. Yet, the very systems that manage this vital resource—our water and wastewater infrastructure—are increasingly vulnerable to cyber threats. Many utilities operate with outdated...

Read More
  • By : Don Wells
  • cybersecurity
  • Comments Off on The Reality of Modern Cyber Threats

The Reality of Modern Cyber Threats

In today’s digital landscape, cybersecurity threats are no longer confined to malware or lone hackers seeking quick financial gain. Sophisticated, persistent adversaries—especially those backed by nation-states—have elevated cyber intrusions into a long game. These actors infiltrate systems with the...

Read More