Revolutionary Security
  • Cybersecurity Services
      • Cybersecurity Services
        • Assess & Test
          • Framework-Based Assessments
          • Penetration Testing
          • Breach & Attack Simulation (LiveFire®)
          • Incident Response Tabletop Exercises
          • Insider Threat Assessments
          • OT Assessments & Tests
        • Design & Build
          • Security Operations Transformation
          • Incident Response Planning
          • Cyber Threat Intelligence
          • Threat Hunting
          • Vulnerability Management
          • Insider Threat Mitigation
          • Cloud Security
          • OT Network Defense
        • Operate & Support
          • Incident Response & Remediation
      • About Us
      • Careers
      • Contact Us
      • Blog

      Can cyber threats navigate between your IT and OT networks?

      Be prepared. Integrate security operations across your enterprise.

      LEARN MORE

  • Cybersecurity Services
    • Assess & Test
      • Framework-Based Assessments
      • Penetration Testing
      • Breach & Attack Simulation (LiveFire®)
      • Incident Response Tabletop Exercises
      • Insider Threat Assessments
      • OT Assessments & Tests
    • Design & Build
      • Security Operations Transformation
      • Incident Response Planning
      • Cyber Threat Intelligence
      • Threat Hunting
      • Vulnerability Management
      • Insider Threat Mitigation
      • Cloud Security
      • OT Network Defense
    • Operate & Support
      • Incident Response & Remediation
  • About Us
  • Careers
  • Contact Us
  • Blog
  • Request a Consultation
  • Blog
  • Trevor Houck

Cyber Insights & News

Browse Topics
  • Industrial Control Systems (ICS)
  • Assessments
  • OT Network Defense
  • Vulnerability Management
  • Insider Threats
  • Cyber Attacks
  • Cyber Threats
  • News & Events
  • Security Operations
  • Countermeasures
  • Incident Response
  • Training & Awareness
  • Risk Management
  • Strategic Planning
  • Security Controls
  • Cloud Security
  • Cyber Threat Intelligence
  • Compliance
  • Penetration Testing

Subscribe Here!

Trevor Houck

Trevor Houck

Trevor is a cybersecurity professional with experience in both Information Technology (IT) and Operations Technology (OT) environments. Trevor brings extensive experience working as a penetration tester and intelligence analyst performing various functions within global Security Operations Centers (SOCs) for Fortune 500 organizations, including IT/OT integrated SOC environments.
DIY Security Indicators—Leveraging the Value of OT Metadata
In my last post, I provided considerations and imperatives when scoping the right security operations center (SOC) model for your OT needs. I …
Read Post
Choosing the Right SOC Model for Your OT Needs
Cybersecurity monitoring has traditionally focused on internet-facing enterprise networks, with very little consideration of control systems …
Read Post
Breaking the OT Log Jam: How to Effectively Leverage OT Security Logging
Given the current cyber threat landscape, it’s no surprise that organizations are advancing their cybersecurity protections to defend their …
Read Post
Validating Security Controls and Countermeasures with Penetration Testing
It’s been a few weeks and the dust is starting to settle following the reported data breach in September 2017 at Equifax, one of the big three credit …
Read Post
Prev Next
Contact
  • +1 267.664.4200
  • 350 Sentry Parkway
    Bldg. 670, Suite 201
    Blue Bell, PA 19422
Connect
  • LinkedIn
  • Twitter
More
  • Careers
  • Privacy Policy
  • Resources
©2021 Revolutionary Security. All rights reserved.