OT Security Blog: Insights & Industry News
Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems
Using IEC 62443 to Secure OT Systems: The Ultimate Guide
Learn More5 OT Vulnerability Management Challenges (and How to Overcome Them)
Common challenges to vulnerability management in OT cyber security and ways to overcome them to create safer industrial and operational environments.
Read moreWhat is an OT SIEM and How is it Different from IT SIEM?
Industrial companies maturing their enterprise cyber security programs often ask: what is an OT SIEM, do I need it and how does it integrate with IT SIEM?
Read moreChallenges of Using Anomaly Detection Tools for Asset Inventory
Discover why comprehensive ICS asset inventory is crucial for OT cybersecurity. Learn limitations of passive tools and how detailed context improves security posture.
Read more7 Steps to Protect Against Ripple20 Vulnerabilities in OT/ICS
What is Ripple20, how does it affect vulnerable systems in OT environments, and how can you manage vulnerabilities in ICS cyber security?
Read moreWhy is OT Systems Management Critical to ICS Systems Security?
How OT security leaders such as the CIO and CISO can apply IT Systems Management into ICS systems security into a new approach called OT Systems Management
Read moreOT Systems Management: Defining Policies and Procedures
To conduct OT cyber security with effective OT systems management, establish policies and procedures that match the specific OT environment of your organization.
Read moreHow to Be Selective About Remote Access in OT Cyber
Remote access is not just about using a VPN or user accounts, but both remote endpoints, portals and systems contained within site infrastructure
Read moreManaging ICS Endpoint Security During COVID-19
4 steps for greater OT endpoint protection during the novel coronavirus pandemic
Read moreWhat is OT Endpoint Security Management?
Minimize the attack surface across all assets in industrial environments through OT endpoint management and a pharmaceutical endpoint management case study.
Read moreCISA's Top 10 Routinely Exploited Vulnerabilities
A perspective on what the CISA’s Top 10 Routinely Exploited Vulnerabilities report is missing and how it could become more useful for OT cyber security professionals.
Read more