OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

4 Elements for Developing a Mature OT Systems Management Process

Learn More
Filter By:
  • Reset Filter
Blog January 14, 2021

Compensating Controls in ICS Security

How and when to apply OT/ICS compensating controls when software patching is not an option in industrial cyber security.

Read more
Blog January 8, 2021

SolarWinds: Implications of Compromised Supply Chain Security

Following the SolarWinds software incident, what lessons can asset owners learn from published causation and guidance - and how can product owners for more to help secure their customers?

Read more
Blog December 21, 2020

Network Stack Fuzzing: Amnesia 33 and MCUs (siblings to CPUs in most IACS devices)

MCU-based devices are not really the same as a PLC with an MMU and stack-to-device vulnerability matching isn’t as bad as it seems.

Read more
Blog December 15, 2020

OT Cyber Security Technology Investment: Gifts That Keep on Giving

This holiday season, give a gift or make an investment that is beneficial to organizations tackling industrial cyber security.

Read more
Blog December 10, 2020

4 OT/ICS Security Patching Lessons Learned from a Decade of Experience

Our extensive experience in patch management security led us to develop a range of learnings that we leverage in our work, and that others in industrial environments can benefit from when it comes to patching OT systems.

Read more
Blog December 2, 2020

Adding Recovery to Operational Technology Incident Response

Ron Brash's response to Public Safety Canada's recent guidance to an OT and IT Cyber Incident Response Plan (CIRP)

Read more
Blog December 1, 2020

Defend Against Ransomware with a 360-Degree OT Vulnerability Management Program

What is OT/ICS vulnerability management, why is it critical in cyber security, and what role does it play in ransomware defense and protection?

Read more
Blog November 24, 2020

Can't Apply A Software Patch? Try These 5 Alternatives

When you can’t patch, or rip and replace your ICS equipment or software, control your environment to control your risk.

Read more
Blog November 18, 2020

Ransomware Protection: How to Prevent & Detect OT/ICS Ransomware

Reduce the risk of a ransomware infection, leverage existing technology investments and improve recovery

Read more
Blog November 13, 2020

Protecting Embedded Systems in OT Cyber Security

Learn how to protect OT embedded devices and firmware in OT/ICS cyber security environments.

Read more
Blog November 5, 2020

5 Questions a CISO Should Ask About OT/ICS Cyber Security

These are 5 questions CISOs should ask as they pursue an OT or ICS cyber security program and establish an effective industrial organization and technical approach.

Read more
Blog October 30, 2020

5 Steps to Improve Cyber Security Awareness in Manufacturing and OT/ICS

Don't wait to tackle cyber security until it's too late. Here are five ways you can proactively prepare your organization with cyber security awareness.

Read more