OT Security Blog
Insights on Resilience, Vulnerability Management, and More

Accurate OT Asset Discovery Is the Key to Real Cybersecurity
By Walt Boyes You can’t protect what you don’t know you have. OT Cybersecurity is directly linked to your asset inventory, as well as the control systems you are running.…

Why Context Is the Missing Link in OT Asset Management
By Walt Boyes Now that you’ve torn out your hair, banged your head on your desk, and asked your boss to find somebody else to run OT asset management, he…

When You Inherit OT Asset Management and No One Has Accurate Records
By Walt Boyes Your boss just called you into the office and told you that because of staff cutbacks you are now responsible for asset management in the plant. What…

Why OT Asset Management Needs Real-Time Discovery
By Walt Boyes You cannot measure what you cannot see. You cannot control what you cannot measure. You cannot protect what you cannot control. If your job is OT Asset…

OT asset inventory made easy
By Walt Boyes This is part of a blog series. Please read Part I and Part II here. When last we left our hero, he was juggling maintenance issues and…

Contextual metadata ties technical OT asset information to use cases
By Walt Boyes This is part of a blog series. Please read Part I here. Our hero has been trying his very best to follow rule number one: you cannot…

Why manual OT asset inventories don’t work
By Walt Boyes When we last saw our intrepid maintenance lead cybersecurity chief, he was waking up in the middle of the night from dreams of being the little Dutch…

When Cybersecurity Vendors focus on the OT network and ignore the Plant Floor
By Walt Boyes Congratulations! Along with your other responsibilities as Maintenance Engineer, your boss has just appointed you OT Cybersecurity lead. So now you have to find time and budget…

Boyes: No OT vulnerability management without an OT asset inventory
By Walt Boyes What we know is that we can’t manage OT asset vulnerabilities from the vulnerability side of the equation. We know that doesn’t work, because the vulnerability space…

Boyes: Taking a hard look at OT threat detection
By Walt Boyes When you want to control something, you must measure it. You cannot control something you cannot measure. That’s what we do in OT- we measure and then…

Boyes: Use common sense in OT security
By Walt Boyes Our last article identified some serious and quantifiable risks for cyberinfrastructure failure not caused by external threat actors. These risks form the basis for most cyber threats…

Boyes: OT security defenders need to look inside, not outside
By Walt Boyes For over a decade, we have been reacting to the fear of cyber intrusion into OT (Operations Technology) networks in our industrial process plants, refineries, pipelines, and…