OT Security Blog Articles

Insights on Resilience, Vulnerability Management, and More

5 Reasons Why Effective OT Security Requires An Accurate Asset Inventory

5 Reasons Why Effective OT Security Requires An Accurate Asset Inventory

In the current digital era, the manufacturing and oil and gas industries extensively rely on technology to increase efficiency and productivity. However, as technological dependence increases, so does the risk of cyber attacks and security breaches. For the success of these industries, an effective operational technology (OT) asset inventory is essential.  

read more
What are Tangible Results in OT Security?

What are Tangible Results in OT Security?

Fact is that oftentimes the chances that an asset owner’s investment in ICS Detection technology and related services easily exceeds the damage that could reasonably be expected from a cyber-physical attack.

read more
One cyber-physical attack less on the record!

One cyber-physical attack less on the record!

As we now know, the 2021 cyber incident in Oldsmar, FL was anything but a cyber attack. In reality, an employee mistakenly clicked the wrong buttons, before alerting his superiors to his error, as recently disclosed by a city official. And guess what, the accidental...

read more
What is OT security execution, and why should you focus on it?

What is OT security execution, and why should you focus on it?

Progress requires an objective, a plan to reach that objective, and a means to measure how far you have come. All that is missing in the predominant OT security school of thought is primarily concerned with threat detection. If you spend more resources on that issue, you won’t see less threats; you will see more.

read more
Beyond Fear, Uncertainty and Doubt: Making the case for OT resilience

Beyond Fear, Uncertainty and Doubt: Making the case for OT resilience

Reliable operation of our critical infrastructure, manufacturing, and other highly automated industries is too important to leave it to companies living off instilling fear, uncertainty, and doubt. It’s time to approach the problem with a more rational, engineering-oriented approach. That’s what OT resilience is all about.

read more
10 Steps To Building Your OT Resilience Strategy

10 Steps To Building Your OT Resilience Strategy

Vulnerability Management: Identifying and assessing vulnerabilities, threats, and risks in OT systems and creating a risk-based inventory and alignment with IT systems. Developing risk management frameworks and plans to proactively mitigate the impact and likelihood...

read more