OT Security Blog Articles
Insights on Resilience, Vulnerability Management, and More
Using Automation to Resolve the False OT Security Skills ‘Shortage’
What if I told you that this alleged shortage isn’t actually one at all? It is a false perception brought about by outdated framing of OT security in the twenty-first century.
Streamlining Your Digital Transformation with OTbase Software
The process of navigating this transition is not an easy one; however, if you have the right guidance and the right tool, you can be up and running in no time at all.
How to boost your OT vulnerability management with one click
If you have tackled vulnerability management in OT, chances are you ended up in frustration. It is virtually impossible to keep up with the constant stream of new vulnerabilities. Why? Because in OT, we are faced with a huge cost for installing security patches and...
Active OT/ICS Asset Discovery: A journey from ignorance to insight
An excel spreadsheet is the starting point in almost every journey to master modern OT infrastructures. Control engineers attempt to store their knowledge about OT systems in an excel table so they and their coworkers understand the most important digital...
How the Florida water hack shows everything wrong with OT security
The Florida water hack gives you a good idea of what OT security reality looks like -- and it's in stark contrast to the Kabuki theater performed by OT security vendors, the media, and the government. Let's break it down. ICS Detection is useless Over the last couple...
OT/ICS Firmware & Software Inventory Made Easy
Are you struggling with the development and maintenance of an OT firmware and software inventory? Most asset owners are using Excel for asset inventory. The problem with Excel is that in most spreadsheets you rarely see software or firmware details. You may see an OS,...
Introducing OT-BASE Asset Center 5
In the face of digital transformation, OT environments are becoming more complex, more connected, more vulnerable, and less transparent. The tools used to manage these environments need to be evolving even more quickly. That is why we are constantly pushing out new...
What is OT/ICS vulnerability management? What works, and what doesn’t
Understanding what OT vulnerability management is isn't difficult. Practicing it is what is difficult. So, let's get the easy part out of the way! What is a vulnerability? A vulnerability is a system weakness that, if exploited, will result in a breach of system...
What is OT/ICS asset management?
The following is a trascript of this video: OT asset management is sometimes viewed as one of the more boring subjects in industrial automation. The idea of maintaining an inventory of your OT devices, worst case done manually and involving periodic walk-down...