OT Security Blog
Insights on Resilience, Vulnerability Management, and More
What is OT/ICS asset management?
OT asset management is sometimes viewed as one of the more boring subjects in industrial automation. The idea of maintaining an inventory of your OT devices, worst case done manually…
The Stuxnet Story
The following text is a transcript from the video with the same title: In 2007, an unidentified person submitted a code sample to the collaborative anti-virus platform…
Debunked: Why you don’t need ICS detection to detect new devices in your OT network
Rumor is spreading that an OT asset management system needs help from an ICS detection product in order to detect new devices in your networks. Let’s correct this misconception. Silent…
A comprehensive guide to OT/ICS asset management
In this guide we outline what OT/ICS asset management is, what it can do for you, and why it is required for sustainable OT security. What is OT, and what…
Discovering Network Details & Topology with OT-BASE
Are you losing track of network details and topology? Dozens or hundreds of process networks with thousands of endpoints are nothing special in today’s digital OT environments. Maintaining an accurate…
OT Vulnerability Management Using an OT/ICS Asset Management System
OT vulnerability management is challenging – there are far more vulnerabilities in OT, patch rates are lower, and there is an overall lack of visibility in the systems. In the…
Create Excel Sheets for Your OT/ICS Asset Inventory, Automatically!
Excel is not a good tool to use as an asset inventory replacement, but it is a great tool to share inventory information with management, coworkers, contractors, and vendors.
Mastering OT Security is not about defending against threats; OT security is about thinking outside the box test
Fact is that oftentimes the chances that an asset owner’s investment in ICS Detection technology and related services easily exceeds the damage that could reasonably be expected from a cyber-physical attack.
