OT Security Blog Articles

Insights on Resilience, Vulnerability Management, and More

The OT cyber risk they didn’t tell you about

The OT cyber risk they didn’t tell you about

When you have spent some time in operations technology in the last decade, it is practically impossible that you hadn’t been informed about cyber risk: The risk of falling victim to evil hackers who have no problem messing up your vulnerable-ridden OT infrastructure...

read more
Mastering CVE Matching for OT assets

Mastering CVE Matching for OT assets

In the world of Operational Technology (OT), we find several orders of magnitudes more vulnerabilities than in IT. Therefore, vulnerability identification and management becomes a much more challenging task that requires a dedicated tool. Vulnerability matching is one...

read more
Mastering OT Vulnerability Management: Simplifying the Process with Automation

Mastering OT Vulnerability Management: Simplifying the Process with Automation

A single vulnerability can cause substantial damage to critical infrastructure and result in significant security breaches. However, managing OT vulnerabilities is not always a simple process. It can be intimidating, especially when performed manually. Therefore, OT vulnerability management must be automated to increase efficiency and effectiveness. 

read more