OT Security Blog
Insights on Resilience, Vulnerability Management, and More

Using Automation to Resolve the False OT Security Skills ‘Shortage’
What if I told you that this alleged shortage isn’t actually one at all? It is a false perception brought about by outdated framing of OT security in the twenty-first century.

Streamlining Your Digital Transformation with OTbase Software
The process of navigating this transition is not an easy one; however, if you have the right guidance and the right tool, you can be up and running in no time at all.

How to boost your OT vulnerability management with one click
If you have tackled vulnerability management in OT, chances are you ended up in frustration. It is virtually impossible to keep up with the constant stream of new vulnerabilities. Why?…

Active OT/ICS Asset Discovery: A journey from ignorance to insight
An excel spreadsheet is the starting point in almost every journey to master modern OT infrastructures. Control engineers attempt to store their knowledge about OT systems in an excel table…

How the Florida water hack shows everything wrong with OT security
The Florida water hack gives you a good idea of what OT security reality looks like — and it’s in stark contrast to the Kabuki theater performed by OT security…

OT/ICS Firmware & Software Inventory Made Easy
Are you struggling with the development and maintenance of an OT firmware and software inventory? Most asset owners are using Excel for asset inventory. The problem with Excel is that…

What is OT/ICS vulnerability management? What works, and what doesn’t
Understanding what OT vulnerability management is isn’t difficult. Practicing it is what is difficult. So, let’s get the easy part out of the way! What is a vulnerability? A vulnerability is a…
What is OT/ICS asset management?
OT asset management is sometimes viewed as one of the more boring subjects in industrial automation. The idea of maintaining an inventory of your OT devices, worst case done manually…

The Stuxnet Story
The following text is a transcript from the video with the same title: In 2007, an unidentified person submitted a code sample to the collaborative anti-virus platform…

Debunked: Why you don’t need ICS detection to detect new devices in your OT network
Rumor is spreading that an OT asset management system needs help from an ICS detection product in order to detect new devices in your networks. Let’s correct this misconception. Silent…

A comprehensive guide to OT/ICS asset management
In this guide we outline what OT/ICS asset management is, what it can do for you, and why it is required for sustainable OT security. What is OT, and what…

Discovering Network Details & Topology with OT-BASE
Are you losing track of network details and topology? Dozens or hundreds of process networks with thousands of endpoints are nothing special in today’s digital OT environments. Maintaining an accurate…