CMMC Compliance Consulting: Finding the Right Partner

CMMC Compliance Consulting - Corsica Technologies

“Picking a partner to assist in building those policies and procedures is huge.” —Jeff B., IT Manager See Jeff’s Story CMMC compliance is now essential for all Department of Defense contractors that will be working with Federal Contract Information (FCI) and/or Controlled Unclassified Information (CUI). Whether they’re bidding on new contracts or renewing old ones, […]

Integrating Microsoft D4IoT with SOC Tools and Operations

Microsoft D4IoT integration with Sentinel and SOC tools

💡 Need help with OT security?  Pick our brains! Schedule a Consultation Microsoft Defender for IoT is one of the most powerful tools on the market for securing OT environments. It provides passive, agentless monitoring, which is critical for systems that can’t run traditional security agents. You can integrate Defender for IoT (D4IoT) with Microsoft […]

Microsoft Defender for IoT: Use Cases, Devices, and Setup

Microsoft Defender for IoT - Devices and Use Cases

It’s no secret that OT devices are ripe for exploitation by cybercriminals. From unencrypted connections to the fact that they can’t run security agents, these devices are prime targets for cybercriminals. This is why Microsoft created Defender for IoT (D4IoT). This solution offers passive, agentless monitoring that thoroughly protects these devices. But what devices can […]

How Do You Deploy Microsoft Defender for IoT?

How do you deploy Microsoft Defender for IoT? - Corsica Technologies

Here’s a frightening stat: 70% of IoT devices have serious security vulnerabilities. Given their unique protocols, unencrypted connections, and proprietary operating systems, these devices are prime targets for cyberattacks. Microsoft Defender for IoT offers incredible protection for OT and ICS systems. But what does it take to deploy D4IoT—and what options do you have? Here’s […]

What Is Microsoft Defender for IoT?

What is Microsoft Defender for IoT?

💡 Need help with OT security?  We offer a 60-day Proof of Concept for Microsoft D4IoT. Book a Consultation Last updated March 4, 2026. How secure is the world of OT (operational technology), also known as industrial security? Here’s a shocking stat. 98% of IoT device traffic is unencrypted. Yet according to SANS, only 12.6% of organizations […]

What Companies Can Learn from the Jaguar Cyberattack

Jaguar Land Rover cyber attack 2025 - Corsica Technologies

The recent cyberattack on Jaguar Land Rover (JLR) is a sobering reminder that today’s cyberthreat environment is constantly evolving. Even global brands can fall prey to devastating attacks once criminals gain access to their systems. When it comes to business continuity, a successful attack can cause as much disruption as a natural disaster. So what […]

Manufacturing IT Support: Real-Life Advice from a Seasoned Leader

Manufacturing IT support - advice from a leader - Corsica Technologies

Manufacturing IT support comes with many challenges. From shop floor machines to safety and cybersecurity, IT leaders deal with unique issues that aren’t found in other industries. How does a seasoned professional solve these problems? I recently sat down with Nick Holliday, IT Divisions Manager at Nucor Corporation, to discuss his experience in depth. Nucor […]

Top 5 Takeaways from Cybersecurity Expert Rachel Wilson

Daniel Goffen introduces cybersecurity expert Rachel Wilson at the AD PHCP conference

Last updated August 22, 2025. Here at Corsica Technologies, we have the privilege of partnering with Affiliated Distributors (AD), a member-owned trade organization that brings together best-in-class distributors and suppliers to facilitate dynamic business partnerships. We attended AD’s North American Meeting for their PHCP division (Plumbing, HVAC and Pipes, Valves and Fittings). It was great […]

EDI Supply Chain Management: What You Need To Know

EDI supply chain management - Corsica Technologies

Last updated August 14, 2025. EDI is the backbone of the supply chain. Without this technology, trading partners would have to rely on email, phone, or snail mail (gasp) to exchange business-critical documents. But EDI is complicated. There’s a lot to know, and it’s easy to make mistakes. When you add the complexities of the […]

EDI Transactions: What It Takes To Win

EDI Transactions and Document Types - Corsica Technologies

Last updated August 27, 2025. EDI transactions are the lifeblood of business processes. Across numerous industries, these transactions keep things moving. It’s not a stretch to say EDI solutions make the world go round. But what exactly are EDI transactions? Are they different from EDI documents? We’ve got all the details in this article. Key […]

5 IT Support Hacks For Manufacturers And Distributors

IT Support for Manufacturers and Distributors - Corsica Technologies

IT support comes with unique challenges for manufacturers and distributors. It’s common to have limited IT staff—or none at all. If you have an MSP (managed IT service provider), they may operate in “react” mode rather than helping you make proactive decisions. This leads to all kinds of problems. Outdated software, lack of responsiveness, and […]

How to Reduce Manufacturing Downtime with Cybersecurity Best Practices

IT employee holding ipad and managing AI robotics equipment.

Thirty-nine percent of advanced manufacturing executives say their companies were breached in the past year, and 75% say they lacked resources with essential cybersecurity skills. Cybersecurity is essential to keeping manufacturing businesses running.  Availability is a key cybersecurity concern when it comes to manufacturing IT support. Because downtime means you can’t manufacture your product, you could be […]

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.