OT Security Blog: Insights & Industry News
Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems
Using IEC 62443 to Secure OT Systems: The Ultimate Guide
Learn MoreRDP Access: 8 Ways to Protect Against Remote Vulnerabilities
With remote desktop vulnerabilities on the rise, we’re sharing eight actions you can take to secure your OT assets from exposure.
Read moreIT OT Convergence: 3 Things OT Should Immediately Adopt from Current IT Trends
OT teams should adopt IT trends like real-time inventory databases, automation of security remediation and centralized support teams for OT environments.
Read moreThe Value of Empirical Evidence to Quantify OT Cyber Risk
Providing OT or system-specific context to true, ICS Cyber Security Risk
Read moreEndpoint Protection and its Effect on Cyber Security Risk and Intel
99% of cyber incidents happen in the critical infrastructure and Industrial Control System (ICS) space through commodity systems such as Microsoft Windows.
Read moreUSB Device Controls Using Verve Asset Management and BigFix Software
Reducing OT cyber security attack surface by disabling USB ports as a best practice system hardening task
Read moreQuantifying Cyber Risk
Driving empirical analysis of OT cyber security risk in providing effective OT asset management practices.
Read moreVirtual Twins in a Compensating Control Process for Windows 7 & Server 2008 EOL
Converting physical systems to virtual representations when Microsoft End of Lifes (EOLs) Occur on an Operating System
Read moreQuantifying Risk in OT Cyber Security
An initial process on Risk management and vulnerability management in terms of probabilities of successful cyber attacks on Operational Technology (OT)
Read moreCyber Risk Increases in OT when IT Selects Tools
IT and OT worlds continue to run into one another – why is that a challenge? Because good intentions without proper context can lead to disaster!
Read more