#1 Cybersecurity Consulting in the Midwest
Needing security but don't know where to begin? Engage with Cronin Technology for a consultation for MSSP and have a CISO today for your business.
Incidents are never welcomed but having a partner to navigate the process of response, evidence gathering and reading information for your insurance if never hard with us.
Prepare and execute on audits for a wide range of industry standards in IT and OT/ICS systems with Cronin Technologies experience be audit ready everyday.
OT/ICS Specialized Cybersecurity Expertise
Solutions for your security for your entire IT stack from servers to networks and remote access solutions for your organization. We come with over 20 years experience.
OT/ICS systems require special knowledge and tools which we can provide to secure your systems and provide the compliance you need for your OT/ICS systems.
Secure your cloud with Cronin Technology. We design and implement secure solutions for your cloud solutions AWS, Google and Azure or custom applications!
IT/OT ICS Cybersecurity News and Secure Coding!
Article
“ Once you log into the network, you’re trusted. But zero trust is about validating all along the way. That is a big change,” says Carmichael, director of strategy, risk, and compliance advisory at Momentum Technology and a member of the Emerging Trends Working Group at professional governance association ISACA.
Jonathon Cronin
Cronin Technology
Article
There are 2 stories today that bring some great attention to the nature of dependencies and how code packages we build on top of them are both not owned by our organizations and sometimes by no one. Additionally, seeing the use of AI to provide packages that simply don’t exist. This
is less malicious at this time but points to a cybersecurity concern that is new to the AI age. So, what lessons can we gleam from these
current events? Let’s crack in.
Jonathon Cronin
Cronin Technology
Article
We are picking up on the OT/ICS networking for cybersecurity by traveling up to the IDMZ or industrial DMZ. This acts as the barrier in
between the IT network and the Controls or industrial network. This is simple enough but what is above and below this firewall? This time we are again assuming no prior knowledge of control systems and that the reader is coming to this article as an IT or cybersecurity professional.
Jonathon Cronin
Cronin Technology
Contacts
+1-319-310-7963
jon@cronin.technology
Keeping up with technology, cybersecurity and business tailored to Iowa.