Skip to content

OT Security Blog

Insights on Resilience, Vulnerability Management, and More

Filter posts by:
What is OT/ICS asset management?
OTbase

OT asset management is sometimes viewed as one of the more boring subjects in industrial automation. The idea of maintaining an inventory of your OT devices, worst case done manually…

Read more
The Stuxnet Story
OTbase

The following text is a transcript from the video with the same title:       In 2007, an unidentified person submitted a code sample to the collaborative anti-virus platform…

Read more
Debunked: Why you don’t need ICS detection to detect new devices in your OT network
OTbase

Rumor is spreading that an OT asset management system needs help from an ICS detection product in order to detect new devices in your networks. Let’s correct this misconception. Silent…

Read more
A comprehensive guide to OT/ICS asset management
OTbase

In this guide we outline what OT/ICS asset management is, what it can do for you, and why it is required for sustainable OT security. What is OT, and what…

Read more
Discovering Network Details & Topology with OT-BASE
OTbase

Are you losing track of network details and topology? Dozens or hundreds of process networks with thousands of endpoints are nothing special in today’s digital OT environments. Maintaining an accurate…

Read more
OT Vulnerability Management Using an OT/ICS Asset Management System
OTbase

OT vulnerability management is challenging – there are far more vulnerabilities in OT, patch rates are lower, and there is an overall lack of visibility in the systems. In the…

Read more
Create Excel Sheets for Your OT/ICS Asset Inventory, Automatically!
OTbase

Excel is not a good tool to use as an asset inventory replacement, but it is a great tool to share inventory information with management, coworkers, contractors, and vendors.

Read more
Mastering OT Security is not about defending against threats; OT security is about thinking outside the box test
OTbase

Fact is that oftentimes the chances that an asset owner’s investment in ICS Detection technology and related services easily exceeds the damage that could reasonably be expected from a cyber-physical attack.

Read more
Back To Top