About Andrew Storms

Andrew Storms is the VP, Product of New Context, an innovator in data security for highly regulated industries. Andrew has over 20 years in IT security, developing products and solutions for utilities, the enterprise and government. He's a project lead for CES-21, a research initiative around automated cybersecurity threat detection and response within electrical utility operational networks, and a Certified Information Systems Security Professional (CISSP.) Andrew is a graduate of the FBI Citizens' Academy, a member of Infragard, and a member of the Open Standards Technical Committee for STIX,TAXII and OpenC2. His past roles include Senior Director of DevOps at CloudPassage and Director of Information, Technology & Security at nCircle.
12 02, 2019

Security Automation in OT Networks

By |2019-02-12T08:40:26-07:00February 12th, 2019|Articles, Events, featured|

Last week at DistribuTECH 2019, I had the opportunity to participate in a panel discussion on How AI and Machine-to-Machine Learning Are Enabling Cybersecurity Threat Intelligence. I was joined by fellow members of the California Energy Systems for the 21st Century (CES-21) program. Over the past 4 years, [...]

24 08, 2018

The United States electrical critical infrastructure is under attack. Here’s how we fight back.

By |2018-08-24T14:22:27-07:00August 24th, 2018|Articles, Events, featured|

Sharing threat data and standards in cyber threat intelligence will take center stage at EnergySec 2018. Bad actors continue to attack corporate networks to damage systems, data and corporate brands, the next wave of attacks are to industrial control systems (ICS) within the U.S. electrical grid. Our engineers [...]

1 08, 2018

Demystifying AWS IAM (a little, anyway)

By |2018-08-17T09:47:35-07:00August 1st, 2018|Articles, featured|

Identity Access Management (IAM) from Amazon Web Services (AWS) provides the tools necessary for AWS customers to create identities and manage the interplay between identities and resources. IAM is different than the traditional permissions based model. Users usually do not have permissions directly assigned to them. Instead, the common model [...]

Load More Posts