#1 Cybersecurity Consulting in the Midwest

MSSP for IT & OT/ICS orgs of all sizes

MSSP & vCISO

Managed Security Services Provider

Needing security but don't know where to begin?    Engage with Cronin Technology for a consultation for MSSP and have a CISO today for your business.

Incident Response

Managed Incident Response 

Incidents are never welcomed but having a partner to navigate the process of response, evidence gathering and reading information for your insurance if never hard with us.

Audit Prep and Support

ISO, PCI-DSS, HIPPA and more...

Prepare and execute on audits for a wide range of industry standards in IT and OT/ICS systems with Cronin Technologies experience be audit ready everyday.

OT/ICS Specialized Cybersecurity Expertise

Cybersecurity engineering to secure today to protect tomorrow

IT

Cybersecurity solutions partner

Solutions for your security for your entire IT stack from servers to networks and remote access solutions for your organization.  We come with over 20 years experience.

OT/ICS

Specialized experience in OT/ICS

OT/ICS systems require special knowledge and tools which we can provide to secure your systems and provide the compliance you need for your OT/ICS systems.

Cloud & FedRAMP

Cloud security engineering

Secure your cloud with Cronin Technology.  We design and implement secure solutions for your cloud solutions AWS, Google and Azure or custom applications!

protecting today to secure tomorrow

Working with best in class products

Articles from our Substack

IT/OT ICS Cybersecurity News and Secure Coding!

Article

Journey from East to West

“ Once you log into the network, you’re trusted. But zero trust is about validating all along the way. That is a big change,” says Carmichael, director of strategy, risk, and compliance advisory at Momentum Technology and a member of the Emerging Trends Working Group at professional governance association ISACA.

Jonathon Cronin

Cronin Technology

Article

Packages and Dependencies

There are 2 stories today that bring some great attention to the nature of dependencies and how code packages we build on top of them are both not owned by our organizations and sometimes by no one. Additionally, seeing the use of AI to provide packages that simply don’t exist. This
is less malicious at this time but points to a cybersecurity concern that is new to the AI age. So, what lessons can we gleam from these
current events? Let’s crack in.

Jonathon Cronin

Cronin Technology

Article

OT/ICS Networking 2: Industrial DMZ

We are picking up on the OT/ICS networking for cybersecurity by traveling up to the IDMZ or industrial DMZ. This acts as the barrier in
between the IT network and the Controls or industrial network. This is simple enough but what is above and below this firewall? This time we are again assuming no prior knowledge of control systems and that the reader is coming to this article as an IT or cybersecurity professional.

Jonathon Cronin

Cronin Technology

Contacts

How you can reach us

Phone

+1-319-310-7963

Email

jon@cronin.technology

Subscribe to our Substack

Keeping up with technology, cybersecurity and business tailored to Iowa.