OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

The Ultimate Guide to Protecting OT Systems with IEC 62443

Learn More
Filter By:
  • Reset Filter
Blog October 21, 2021

BlackMatter Ransomware and CISA Alert to Wastewater

Remediation and response strategies critical infrastructure operators can take to protect themselves from the risks of Blackmatter ransomware.

Read more
Blog October 18, 2021

What are the NERC CIP Standards and Why Should You Care?

What is NERC CIP and how is a successful NERC CIP compliance program structured for power utilities?

Read more
Blog October 11, 2021

Risk Management for OT Endpoint Security: 5 Steps for Success

How to take a true endpoint security risk management approach for successful cyber defense efforts. This approach provides an OT-specific way of conducting ITSM.

Read more
Blog September 15, 2021

5 Steps to Build an ICS Cybersecurity Program with IEC 62443 Standards

This article is intended to help asset owners, integrators and customers understand how to begin a cybersecurity program to improve overall maturity against the elements of the IEC 62443 standard.

Read more
Blog September 7, 2021

How to Reduce Risk and Respond to Threats in Industrial Environments

What are the overall objectives of OT cyber security and how can we ensure progress against risk reduction and threat response?

Read more
Blog July 27, 2021

Getting Prepared: Tabletops and Scripts to Act Through a Ransomware Event

Finding value and reducing ransomware risks and impacts across people, process and technology

Read more
Blog July 22, 2021

Weathering the Deluge of OT Vulnerabilities: A Pragmatic Approach

When infosec media fixates on certain vulnerabilities, it feels like the world is one hack away from absolute chaos. But is it really?

Read more
Blog July 21, 2021

TSA Issues Part II of Pipeline Cyber Security Directives

This new directive was not released publicly, but from our sources, contains significant new requirements for pipeline operators. Instead of simply reporting and assessment requirements, TSA is following a model that we see becoming the norm: specific requirements of protections and remediating actions.

Read more
Blog, Guide

The Ultimate Guide to Understanding OT Security

What is OT security, how does it work, and where should you start when building a robust cyber security program?

Read more
Blog, Guide June 23, 2021

The Ultimate Guide to Protecting OT Systems with IEC 62443

This comprehensive collection of standards is laser-focused on industrial controls. Here’s how to make the most of them.

Read more
Blog June 21, 2021

How to Get Started with Vulnerability Management in OT Cyber Security

Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference.

Read more
Blog June 3, 2021

How to Prevent Ransomware in 2021

Reduce the risk of a ransomware attack with these proven tips for preventing and protecting against OT/ICS ransomware.

Read more