operational technology
OT Cybersecurity Concerns Are Increasing Across the Globe
2021 was the year that marked a major cyber-attack against a critical national infrastructure organization whose impact was felt by millions of Americans on the East Coast. However, the attack against the ...
How Critical Infrastructure Providers Can Securely Connect OT to the Cloud
Cloud connectivity offers tremendous benefits for critical infrastructure operators. Sending data from operational technology (OT) devices to the cloud opens the door for asset owners to use remote diagnostic and analysis tools, ...
Securing Critical Infrastructure with XDR
In January, CISA, the FBI and the NSA released a joint Cybersecurity Advisory (CSA), titled Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure, that provided an overview of Russian ...
OT Vulnerability Management: A Risk-Based Approach
The number of missing security patches in an OT system is typically very large—measured in the thousands, at least. It would be difficult and expensive for an asset owner to evaluate each ...
Designing a 100-Day Sprint for OT Cybersecurity: What to Consider
As we begin a new year, many organizations will enter a “goal-setting and strategic planning” season. During this time, individuals are re-energized and motivated to record new accomplishments for their professional development ...
Why Is It Important to Invest in OT Cybersecurity for 2022?
As we enter 2022, it’s important that organizations invest in cybersecurity for their operational technology (OT) systems. Why? One of the reasons is that Industry 4.0 can sometimes introduce more risk for ...
Can We Lighten the Cybersecurity Load for Heavy Industries?
One of the biggest problems with the IT / OT convergence in critical infrastructure is that much of the legacy hardware cannot simply be patched to an acceptable compliance level. Recently, Sean Tufts, ...
Not IT vs OT, but IT and OT
IT environments have always been considered the forefront when it comes to cybersecurity, and OT environments have been the forefront when it comes to physical security. As more and more cyber threats ...
Revisiting the Relevance of the Industrial DMZ (iDMZ)
Which Flavor of the Purdue Model Should You Follow? If you enter the term “Purdue Model” into your favorite search engine, the resulting images will vary considerably. There’s almost no better way ...
Mitigating Industrial Production Risk with Tripwire
It seems that the most popular topics in cybersecurity for the last year has been zero trust as well as the convergence of Information Technology (IT) and Operational Technology (OT). These developments ...