Blog Articles

Misjudging OT security risk, part 2: Comparing cost/benefit

In a preceding blog article we discussed the logical flaw in network anomaly detection marketing collateral: Vendors emphatically advocate "passive scanning" with the argument that "active scanning" would be too dangerous, yet focus on completely different risks...

read more

How can you get a solid OT/ICS security plan for free?

A leading cause of inefficient and frustrating OT security efforts is the lack of a top-down approach that starts with top management and a solid high-level cyber security plan. Such a plan is a comprehensive yet brief breakdown of all the major activities the...

read more