Boyes: OT security defenders need to look inside, not outside

Boyes: OT security defenders need to look inside, not outside

By Walt Boyes For over a decade, we have been reacting to the fear of cyber intrusion into OT (Operations Technology) networks in our industrial process plants, refineries, pipelines, and drilling rigs. We have dropped everything to patch apparent vulnerabilities...
Understanding The Basics of OT asset management

Understanding The Basics of OT asset management

OT asset management, or Operational Technology asset management, refers to identifying, organizing, and maintaining assets within an operational technology environment. Operational technology refers to the hardware and software systems used in manufacturing, energy,...

The big OT asset visibility misconception

You have heard it a dozen times: You cannot protect what you don’t see. You need asset visibility! Based on this trivial insight, OT security vendors usually explain how you can achieve such visibility with their products. Let’s check what that actually means in...
Threat-centric vs. infrastructure-centric OT security

Threat-centric vs. infrastructure-centric OT security

There are two general approaches to OT security. One approach is threat-centric and attempts to identify and eliminate cyber threats in OT networks. The other approach is infrastructure-centric and largely doesn’t care about threats. Instead, it attempts to create a...