When you have spent some time in operations technology in the last decade, it is practically impossible that you hadn’t been informed about cyber risk: The risk of falling victim to evil hackers who have no problem messing up your vulnerable-ridden OT infrastructure...
In our previous blog post, we explored how OTbase Asset Management Software helps you match CVE data to your devices. Today, we’re diving into another powerful feature of OTbase Asset Inventory: Quick Search. As demonstrated in this video tutorial, Quick Search...
By Ralph Langner Is OT security all about tracking the latest threats and trying to neutralize them in your OT environment? If that is your worldview, you have set yourself up for a constant struggle with no real hope or plan for improvement. You will always be a step...
In the world of Operational Technology (OT), we find several orders of magnitudes more vulnerabilities than in IT. Therefore, vulnerability identification and management becomes a much more challenging task that requires a dedicated tool. Vulnerability matching is one...
Regarding OT asset management, security is undoubtedly a critical concern. However, it’s not the only concern. Several other engineering use cases are just as important, if not more so. In this blog post, we’ll explore some of the engineering use cases...