In The News
Take a Beat on AI, CISA Tells OT Operators
Joseph M. Saunders comments on the use of AI-generated code in embedded systems and how it relates to CISA's new...
Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience
Joseph M. Saunders shares why the greatest risk for the power sector is vulnerabilities in the software supply chain...
We’ve Got Worms: Update on Sandworm Infostealer
Joseph M. Saunders comments on the dangers of the Shai-Hulud Sandworm for software supply chain security and advice...
What Jaguar Land Rover’s Shutdown Reveals About the Next Supply Chain Crisis
Joseph M. Saunders explains how Jaguar Land Rover’s cyberattack demonstrates the complexity of supply chains, and what...
As industrial systems modernize, adaptive OT cybersecurity replaces patchwork defense
Joseph M. Saunders discusses why one of the biggest blindspots in industrial systems is vulnerabilities in the...
Hidden Surveillance Threats to U.S. Critical Infrastructure
Joseph M. Saunders discusses how industrial espionage evolved from IP theft to surveillance and infrastructure...





