OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

The Ultimate Guide to Protecting OT Systems with IEC 62443

Learn More
Filter By:
  • Reset Filter
Blog December 21, 2020

Network Stack Fuzzing: Amnesia 33 and MCUs (siblings to CPUs in most IACS devices)

MCU-based devices are not really the same as a PLC with an MMU and stack-to-device vulnerability matching isn’t as bad as it seems.

Read more
Blog December 15, 2020

OT Cyber Security Technology Investment: Gifts That Keep on Giving

This holiday season, give a gift or make an investment that is beneficial to organizations tackling industrial cyber security.

Read more
Blog December 10, 2020

4 OT/ICS Security Patching Lessons Learned from a Decade of Experience

Our extensive experience in patch management security led us to develop a range of learnings that we leverage in our work, and that others in industrial environments can benefit from when it comes to patching OT systems.

Read more
Blog December 2, 2020

Adding Recovery to Operational Technology Incident Response

Ron Brash’s response to Public Safety Canada’s recent guidance to an OT and IT Cyber Incident Response Plan (CIRP)

Read more
Blog December 1, 2020

Defend Against Ransomware with a 360-Degree OT Vulnerability Management Program

What is OT/ICS vulnerability management, why is it critical in cyber security, and what role does it play in ransomware defense and protection?

Read more
Blog November 24, 2020

Can't Apply A Software Patch? Try These 5 Alternatives

When you can’t patch, or rip and replace your ICS equipment or software, control your environment to control your risk.

Read more
Blog November 13, 2020

Protecting Embedded Systems in OT Cyber Security

Learn how to protect OT embedded devices and firmware in OT/ICS cyber security environments.

Read more
Blog November 5, 2020

5 Questions a CISO Should Ask About OT/ICS Cyber Security

These are 5 questions CISOs should ask as they pursue an OT or ICS cyber security program and establish an effective industrial organization and technical approach.

Read more
Blog October 30, 2020

5 Steps to Improve Cyber Security Awareness in Manufacturing and OT/ICS

Don’t wait to tackle cyber security until it’s too late. Here are five ways you can proactively prepare your organization with cyber security awareness.

Read more
Blog October 13, 2020

How to Close the OT Cyber Security Talent Gap

With a national skills shortage and gap of OT cyber security professionals, how do we leverage our current resources and develop the right jobs to improve the future?

Read more
Blog October 1, 2020

Embedded OT Vulnerabilities: An Asset Owner Perspective

What should asset owners be aware of with embedded OT systems and buried vulnerabilities, and what remediation tactics are available?

Read more
Blog September 24, 2020

So Your Vulnerability Assessment is Finished... Now What?

Once you’ve finished a vulnerability assessment in OT/ICS cyber security, you’ll start securing OT endpoints. But how can a security blueprint assist?

Read more