Stranger than Fiction: Exploring the New Battlefield at the Industrial Edge with Chase Cunningham (Part 1)

“This is the world we all know and love. But there is a darker side to it all . . .” This opening line is from “The Cynja: Volume 1,” a graphic novel about the risks of our digital world. FreeWave sat down with its author, Dr. Chase Cunningham. When not writing fiction, the retired U.S. Navy Chief helps organizations adopt both a zero-trust policy and mindset to author a brighter, safer future. Fortune 500 companies, small businesses, startups, the media, and the U.S. government rely on Cunningham to win the war on cyber. Because while zombies, worms, and botnets may be the work of fiction, the truth, as Mark Twain once said, is far stranger. The Edge is Exposed Cunningham would like to be out of a job. That would mean the world is safe, devices are designed battle-ready, and people are invincible to cyber threats. This is not likely to happen in the near future. “Do you have a statistic to show how at risk we are?” we asked. “I can do you one better, I’ll show you.” That’s when Cunningham tap, tap, tapped on his keyboard, pulling up examples of vulnerabilities in under 30 seconds. It got real, real fast. His black screen lights up with cascading white lines of IP addresses like a scene from an Ironman movie. “These are IT/OT devices. I could breach these folks,” he says casually. “I’m looking at about 206 fuel tank control systems that have gas in the tank.” Travel centers in Dallas, Texas, and New Haven, Connecticut, are on the list. There are gas stations in Georgetown, Virginia. “Those are things that should be fixed and should be isolated. But they’re literally talking to the internet.” Except, they shouldn’t be talking to the internet. Devices and equipment at the edge include wind turbines, water systems, airline systems, and fuel stations. Each, he points out, is a path to corporate, a path to data access, a path to cyber risk. A regional airline booking system is connected to a larger enterprise. Gas stations are connected to global oil and gas companies. The edge is an entry point to a much larger landscape. “Do you really understand how vulnerable we are?” he asks. “. . . an OT/IT, IoT device, people bring them in and plug them in. Who’s holding the bag? If you’re on the internet, it’s an issue for you.” The Case for Zero Trust at the Edge Cunningham has long held a front row seat via senior security and analyst roles at NSA, CIA, FBI, and other government agencies. At Forrester, he pioneered the firm’s Zero Trust eXtended framework. He holds six patents and is the international best-selling author of “Cyber Warfare – Truth, Tactics, and Strategies.” According to a LinkedIn post in early 2025, his podcast The Dr.ZeroTrust Show hit 250,000 listeners on Spotify. At FreeWave, we know zero trust keeps the industrial edge safe. That’s why we’ve introduced Zentry™, a disruptive new technology for industrial operations in the field. Our customers have operated on the edge – from acres of oil fields to water treatment plants to remote agricultural regions – for more than 30 years. During that time, the attack surface has grown alongside the rise of IoT devices. Edge vulnerabilities are sometimes overshadowed by operational stability and legacy equipment not originally designed for modern security concerns. Bringing zero trust to the edge means applying the core zero-trust principle to edge devices and equipment: “never trust, always verify.” While seemingly straightforward, Cunningham says that if you asked 100 people in a room to define zero trust, 99 would take different approaches. Who better, then, to define zero trust than the doctor himself? “In the context of zero trust, there are things in my network or things in my infrastructure that have got default (settings) and are able to do things because they came from the manufacturer that way, especially OT.” He says it’s not a good idea to just turn things on, cross your fingers, and hope that everything goes the way that it’s supposed to. The core of zero trust for operational leaders is to remove trust inside the network. Since OT/IoT devices on the edge are designed for specific functions, they are well-suited for zero-trust security models. “OT, IoT, all these kinds of smart technology things that are coming online now, they’re supposed to be kind of binary in nature, right?” Think of a home thermostat. Its job is to relay temperature much like a sensor monitoring extreme temperature during oil drilling. Neither device should be sending packets of data elsewhere or inviting dark actors in. “If there’s any one area I think you can apply zero trust to, carte blanche, it is OT,” says Cunningham. Zero Trust and Control Zero-trust principles such as segmentation and isolation make it simpler to define what behaviors are expected and quickly spot anomalies. In the OT space, controls limit what these devices can do and who or what they can communicate with, reducing the risk of lateral movement by attackers and limiting the blast radius if a breach does occur. He says that managing OT and IoT environments with policy engines and automation, rather than relying on manual processes, further strengthens security and makes zero trust both practical and valuable. The goal: no dark corners, nothing unexpected, and no empowering the bad guy. Cunningham offers up an example that underscores the complexity and interconnectedness of modern OT/IoT environments and the importance of having policy controls for all connected assets. On one floor of a small factory, machines move things around. Others create products. The machines are on-site with standard infrastructure controls around them. However, another building outside is run by a third-party that produces specific parts for the manufacturing line. Those operational processes must be networked together. The scenario is familiar to anyone in operations.
7 Reasons OEMs Are Adopting Security by Design Early in the Product Development Life Cycle

In today’s world, every CEO, CIO, CSO, or CFO is liable for compliance and failing “Pen Testing” (penetration testing) scores, not to mention rising insurance premiums. The pressure of thwarting the increasing security breaches and hacks demand a robust solution that lowers costs and increases network security without navigating complex solutions from multiple vendors. So what is the value proposition of adding security to an OEM’s device early in the product life cycle? “If you were just offering a communications device before, you could be looking at increased network security through the same lens as everyone else,” said Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave. He adds, “The outcomes transform commodity-priced hardware into a differentiated solution.” “Today you are selling hardware and tomorrow you are selling a valuable solution with ARR, all while becoming more relevant to your customer and solving real security problems over just connectivity. If you have devices that give you security and also include communications, you’re going to win faster.” “If you have devices that give you security and also include communications, you’re going to win faster.” – Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave For OEMs, proactive threat detection starts with zero trust. Zero trust ensures every interaction is verified and that OEM products are trustworthy. OEMs and Preparing for the Future The importance of cybersecurity extends to our readiness as a nation. Thousands of OEMs contribute to the U.S. defense industrial supply chain across 16 critical infrastructure sectors. According to the U.S. Department of Defense Cybersecurity Strategy, the first of its kind in the country’s history, ensuring our safety means having “a cybersecurity framework built upon zero trust principles.” As a network is continuously monitored, a zero trust security approach gives systems administrators time to focus on highest-risk items and stay ahead of threats. The Department of Defense has committed to fully deploy zero trust by the end of 2027. The demands for OEMs to address security are rapidly evolving. Secure by Design is a principle that prioritizes security early in design rather than leaving it as an afterthought. Industrial sectors like oil and gas, energy, municipal water, and wastewater departments use thousands of devices across a network. These assets have multiple contracts and multiple vendors. A disgruntled employee or third-party vendor has the potential of seeing everything and doing serious damage with traditional security. Yet, a minute of downtime can cost millions. Take North America’s largest steel producer, $30 billion Nucor, as an example. Its data breach in May 2025 due to “unauthorized third-party access” triggered shutdowns at multiple facilities. As IT/OT integration grows, the Nucor data breach underscores how cyberattacks are growing in sophistication right along with the attack surface, which includes IIoT devices, communications, gateways, sensors, robotics, industrial routers, PLCs, and wireless access points. Security, it turns out, is everyone’s concern, especially forward-thinking OEMs of industrial-grade networking hardware and edge devices like cellular routers, gateways, and modems. Secure by Design products give OEMs differentiation in a crowded marketplace. FreeWave Offers OEMs Competitive Advantage FreeWave has committed more than 30 years to developing industrial wireless solutions. Today, its end-to-end IIoT solutions transform connectivity, security, edge intelligence, and data insights for remote industrial enterprises around the world. OEMs with small, niche markets to mass-produced industrial-grade products successfully embed FreeWave solutions in agricultural products, automation technology and edge devices. The FreeWave Zentry™ solution is a zero-trust based security solution. It cloaks protected networks, making them “invisible” utilizing a simple concept: never trust, always verify. This means the system doesn’t automatically trust anyone or anything trying to connect to it – even if they’re coming from inside the network. Instead, every access request attempting to access resources is verified whether from a user, device, or application, no matter where they are. Here are seven reasons OEMs are addressing security early in the product development life cycle and how the Zentry solution impacts outcomes for both OEMs and their customers. Differentiation in a Commodity MarketThe Zentry solution allows OEMs to stand out by embedding advanced network security directly into their products, moving them beyond commodity hardware and giving them a unique selling proposition. This makes their offerings more relevant and valuable to customers, helping them pull away from competitors who only provide standard connectivity features. Simplified and Consolidated SecurityBy integrating the Zentry solution, OEMs offer consolidated network security as part of their product, eliminating the need for customers to manage separate VPNs, static IPs, port forwarding, and multiple vendors. This reduces complexity, points of failure, and administrative overhead for OEMs and their end customers. Increased Network SecurityThe Zentry solution provides a zero-trust overlay, making devices and networks “invisible” to unauthorized users. It encrypts communications, limits access strictly to what’s needed, and reduces the attack surface – key for critical infrastructure and remote assets. This is especially valuable as cyber threats and ransomware attacks increase across industries. Improved ROI and Lower Total Cost of OwnershipWith the Zentry solution, OEMs and their customers reduce costs by eliminating unnecessary hardware, software, and ongoing maintenance. The solution is aggressively priced, easy to deploy (setup in minutes), and intuitive to manage, making it accessible even for organizations with limited IT resources. Flexibility and Broad CompatibilityThe Zentry solution can be installed on any device with a Linux environment, including cellular gateways, inexpensive Linux boxes, laptops, tablets, and servers, making it broadly compatible with existing OEM hardware and easy to integrate into diverse product lines. Multi-Tenant Management and ScalabilityThe Zentry console is multi-tenant, allowing OEMs to manage security for their own products and for their customers, supporting SaaS and managed service models. This enables new revenue streams and value-added services. Future-Proofing and Market RelevanceAs security becomes a top priority for buyers, OEMs embedding the Zentry solution are better positioned for the future, offering solutions that address both current and emerging threats, and aligning with the industry’s shift toward integrated, secure, and
FreeWave Technologies Welcomes Cybersecurity and AI Industry Specialist to Lead Security Offerings

November 12, 2025 – Boulder, CO FreeWave Technologies, Boulder, CO is pleased to announce that Andrew Livingston has joined the team as Senior Solution Sales Engineer. This strategic hire underscores FreeWave’s commitment to expanding its market presence and delivering enhanced Industrial edge security solutions, like its FreeWave Zentry™ zero-trust based offering to customers worldwide. Andrew will leverage his advanced knowledge and expertise to help organizations increase their network security with Zentry while securing their infrastructure assets. His appointment comes at a pivotal time as industries increasingly recognize the critical importance of robust security measures for connected industrial systems. “We are thrilled to welcome Andrew to the FreeWave team,” said Michael Tate, COO and SVP of sales and marketing. “His unique combination of cybersecurity and artificial intelligence expertise along with his technical solution understanding positions him perfectly to help our customers navigate the complex security landscape. As industrial connectivity continues to expand globally, having leaders like Andrew on our team ensures we can deliver the sophisticated, secure solutions our customers demand.” Andrew brings more than a decade of deep experience in governance, risk, and compliance (GRC) and data security posture management (DSPM), with a proven track record in turning complex cybersecurity frameworks into measurable business outcomes. His educational background includes a Master of Science in Artificial Intelligence and a Master of Science in Project Management, providing him with both the technical depth and strategic perspective necessary to address today’s industrial security challenges. The FreeWave Zentry solution creates an invisible security layer that eliminates the attack surface. Embedded in the Elements™ ES1000 Zentry security provides just-in-time connections to only those access requests that are authorized. This reduces operational risks, cuts license costs and meets Zero Trust mandates (CISA/NIST) with a single solution. Together, they create a temporary, invisible, and secure link that vanishes once the task is complete, leaving no doors open. FreeWave Technologies continues to lead the industry in helping critical infrastructure automate and connect securely at the edge by providing critical data and connectivity solutions for industrial applications. Andrew’s addition to the team reinforces the company’s position as a trusted partner for organizations seeking to securely connect and monitor their critical infrastructure. About FreeWave Technologies FreeWave continues to transform industrial communication with more than 30 years of proven, proprietary radio technology deployed in the world’s most demanding environments. We deliver open-standards wireless networks, AI-powered edge applications, and an integrated cloud platform that’s secured by FreeWave Zentry zero trust architecture. From traditional telemetry to advanced edge AI and autonomous systems, FreeWave empowers you to secure the entire data lifecycle, from collection to monetization. Backed by a strong IP portfolio and global partnerships, we’re built for the future of industrial intelligence Contact: Sue MooreVP of MarketingFreeWave [email protected]
FreeWave Technologies Unveils Zentry™: Enhancing Secure Connectivity for Industrial IoT with Zero Trust Architecture

June 27, 2025 – Boulder, CO FreeWave Technologies, a leader in industrial IoT connectivity, announces the launch of Zentry™, a robust zero trust security solution designed to strengthen edge asset connectivity. Available as an embedded feature within FreeWave’s Elements® ES1000 portfolio or as a standalone solution, Zentry delivers advanced cybersecurity for industrial and enterprise IoT networks, addressing rising threats like endpoint vulnerabilities, system disruptions, and data breaches. Built on the “never trust, always verify” principle, Zentry uses zero trust architecture to secure networks of any size or complexity. Unlike traditional perimeter-based defenses, Zentry authenticates every user and device at every connection point, reducing vulnerabilities and containing potential threats with precision. “Zentry shifts cybersecurity from reactive to proactive,” said Richard Reisbick, CTO of FreeWave Technologies. “Imagine a fortress where every entry requires real-time verification. If a threat emerges, it’s isolated instantly, unable to spread. Zentry assumes risks are ever-present and stops them effectively, enabling businesses to operate securely in today’s challenging digital landscape.” Key Features of Zentry Zentry provides practical, scalable, and user-friendly security tailored for industrial IoT environments: Never Trust, Always Verify: Every access request undergoes strict authentication, ensuring no user or device bypasses scrutiny, whether inside or outside the network. Least-Privilege Access: Permissions are dynamically assigned and monitored, granting only the minimum access needed to prevent unauthorized actions. Microsegmentation: Networks are divided into secure, isolated zones, containing breaches and minimizing their impact on critical operations. Streamlined Management with Zentry Console The Zentry Console, integrated into the FreeWave Data Platform, offers clear visibility and control over Zentry-protected devices. Key capabilities include: Real-Time Device Management: Revoke credentials or adjust permissions instantly from anywhere. Custom Device Identification: Define devices with tailored naming conventions for improved clarity and control. Permission-Based Triggers: Automate and customize management actions to meet your organization’s specific needs. Zentry integrates seamlessly with external Identity Providers (IdPs) and JWT systems, supporting “zero touch” deployments and compatibility with existing identity frameworks. By authenticating connections before they reach the network’s Policy Enforcement Point (PEP), Zentry neutralizes traditional attack vectors, ensuring strong protection for distributed assets. Addressing Critical Cybersecurity Needs Zentry arrives at a crucial time. Industrial control systems face increasing cyberattacks, with potential losses in millions per incident. The European Union’s Cyber Resilience Act (CRA) mandates strict cybersecurity for connected devices, while the U.S. Department of Defense targets full zero trust adoption by 2027 across 16 critical infrastructure sectors, including energy, utilities, and agriculture, all key markets for FreeWave. “Cyber threats are a daily reality,” Reisbick noted. “Zentry enables organizations to meet regulatory requirements, protect critical operations, and stay resilient in a connected world.” Strengthened by Strategic Partnerships In collaboration with NetFoundry and Keyfactor, FreeWave has tailored Zentry to deliver edge-optimized security for remote networks with distributed assets. This partnership ensures Zentry is a scalable, reliable solution for industries like energy, agriculture, and defense, where secure connectivity is essential. Why Choose Freewave Zentry for your Remote Networks? Robust Security: Protect your IoT ecosystem with a zero trust framework that adapts to modern threats. Seamless Integration: Leverage existing infrastructure for quick deployment and minimal disruption. Scalable for Any Network: From small operations to global enterprises, Zentry delivers tailored security without complexity. Regulatory Compliance: Meet requirements with confidence. About FreeWave TechnologiesWith more than 30 years of expertise, FreeWave Technologies is a global leader in industrial IoT solutions, delivering reliable, secure connectivity for mission-critical applications. From energy to agriculture to defense, FreeWave enables industries to succeed in the digital era with advanced technology and deep expertise. Contact: Sue MooreVP of MarketingFreeWave [email protected]
FreeWave Launches Elements® ES1000 with FreeWave Zentry™ Powered by Zero Trust: Solving Secure Remote Networks

June 27, 2025 – Boulder, CO – FreeWave Technologies, Inc. is changing the dynamic of remote network security with the launch of its Elements ES1000 networking device powered by the FreeWave Zentry, zero trust framework. This combination eliminates the vulnerabilities of static IP addresses, delivering unparalleled security and seamless connectivity for critical infrastructure operations. Designed to protect and secure remote assets, the ES1000 with Zentry sets a new standard for IIoT network security, addressing the evolving needs of field crews, IT/OT managers, and C-suite leaders. A single breach can lead to compromised data or devastating and expensive downtime, risking regulatory penalties and damage. Traditional solutions like firewalls or VPNs fail to fully mitigate these risks, as static IPs remain discoverable and exploitable, especially in distributed ecosystems with aging equipment. FreeWave’s solution makes networks essentially invisible to the world while also simplifying how companies setup remote connections. The ES1000 is a rugged networking device and cellular gateway with an embedded zero trust framework that strengthens your network’s security. By enforcing continuous authentication, microsegmentation, and end-to-end encryption, it ensures that every network connection, whether to a pump, valve, robot, sensor, or PLC, is verified and isolated, eliminating the need for static IPs altogether. Data never touches the public internet, and granular access controls prevent lateral movement. This approach aligns with stringent standards like NIST 800-207, IEC 62443, and NERC CIP, ensuring compliance without complexity. Key Features and Benefits of the new FreeWave solution Simplified Management: FreeWave Zentry Console on the FreeWave Data Portal provides a single-pane-of-glass for real-time management, visibility and control of connected devices further optimizing operations. The ability to define devices with custom naming conventions takes IP or device ID differentiation one step further. Embedded Zero Trust Security: Continuous verification and micro-segmentation lock down every endpoint, eliminating static IP exposure and reducing breach risks. Optimized for the Edge: FreeWave designed this combined solution to work in remote locations with heavy intelligent edge-compute requirements. Unlike other solutions, the ES1000 with Zentry provides robust, rugged and reliable connectivity in the harshest environments. Global Connectivity: A single global SIM with automatic carrier switching ensures reliable, cost-effective, low-latency connections for fixed and mobile assets, from rural oil fields to urban grids. Rugged Reliability: Built for harsh environments (-20°C to 70°C), the ES1000 delivers reliability and edge-computer power with quad-core A53 hardware for compute-intensive applications. The ES1000 with Zentry has already proven its value in real-world applications. An operations director at a leading energy firm shared that they, “put the device through the rigors in several different environments and various applications and, it just works.” Steve Wulchin, CEO of FreeWave Technologies, emphasized the strategic impact: “In an era where cyber threats target static IPs and disrupt critical operations, the ES1000 and Zentry deliver a fortress-like solution that empowers industries to scale securely and efficiently. This is more than a product, it’s a commitment to protecting our customers’ critical infrastructure and assets from the field or the boardroom.” FreeWave Technologies has set a new benchmark in IIoT security and connectivity with the launch of the Elements ES1000 device. By eliminating the long-standing vulnerabilities of static IP addresses, this innovative solution delivers robust, end-to-end protection and seamless global connectivity for industries reliant on remote operations. About FreeWave Technologies Headquartered in Boulder, Colorado, FreeWave Technologies has been a pioneer in industrial wireless solutions for over 30 years. Committed to delivering reliable, secure, and innovative connectivity, FreeWave empowers industries to optimize operations and drive efficiency through advanced IoT solutions. Contact: Sue MooreVP of MarketingFreeWave [email protected] FreeWave Elements® ES1000 Copyright FreeWave Technologies. Use prohibited without permission.


