Welcome to Cornell Security
This is a placeholder post to help you start the blog section. You can remove it later or replace it with your first real article.
Cybersecurity · Critical Infrastructure · Signal & Satellite
Articles focused on cybersecurity fundamentals, infrastructure resilience, and defensive practice.
This is a placeholder post to help you start the blog section. You can remove it later or replace it with your first real article.
Before I learned about OWASP or STRIDE, electronics taught me a harsh truth: if a system trusts bad input, it will fail — sometimes violently. ICS and AppSec live in separate worlds, but the problems they face are deeply connected.
November 25, 2023. A remote booster station serving 6,000 people in Pennsylvania was accessed by a hostile actor. The international media followed. Defacement banners appeared on the HMI. Operators we
A PLC or RTU accepts whatever value reaches its input buffers and applies deterministic logic to it with absolute confidence. And when those upstream signals are manipulated—whether sensor readings, t
If you lie to an industrial system about its inputs, it will execute that lie faithfully into the physical world. No hesitation. No intuition. Just deterministic logic doing exactly what it was
How SIGINT, ICS, and Application Security Converge in the Invisible Domain We Depend On
When it comes to securing Operational Technology (OT) and Industrial Control Systems (ICS), visibility isn’t just nice to have—it’s non-negotiable. If you don’t know what assets exist on your industri
In 2025, as organizations adopt zero-trust architectures and AI-powered tools, the core practices of cybersecurity—known as cyber hygiene—remain essential for preventing breaches like ransomware attac
You can’t secure what you don’t know about. In operational technology (OT) environments, maintaining an accurate inventory of assets and their communications paths is the starting point for any defensible architecture.
Emerging trends like AI-driven attacks, remote work, and supply‑chain compromises mean good security hygiene in 2025 looks very different from basic patching and passwords.
A step‑by‑step guide to creating a controlled virtual machine for building and testing cyber defense tools.
A primer on critical infrastructure sectors and why cybersecurity professionals should focus on them.
In today's rapidly evolving cyber threat landscape, having a robust and flexible cybersecurity development environment is crucial for professionals aiming to enhance their defensive capabilities. This
Cyber hygiene refers to routine practices like MFA, patching, and strong passwords that prevent most attacks.
An introduction to SCADA using a brain-and-body analogy to explain how industrial systems monitor and control the physical world.
Imagine the human body performing a simple task—picking up a glass of water. Your eyes see the glass, your brain decides to grab it, your nerves send signals to your muscles, and your hand moves witho
Cyber Hygiene 101: Explore key NIST guidelines to safeguard your digital footprint and prevent costly breaches like MGM's $100 million ransomware attack. Understand why MFA, strong passwords, regular
Imagine waking up without electricity, running water, or a way to call for help. That’s the chaos we’d face without critical infrastructure—the essential systems, assets, and networks that keep our so
Salt Typhoon didn't break encryption or exploit zero-days. They exploited a systemic trust assumption present across every sector of critical infrastructure: valid input equals legitimate intent.