OT Security Blog Articles

Insights on Resilience, Vulnerability Management, and More

IT/OT Collaboration: The Blueprint for Operational Synergy

IT/OT Collaboration: The Blueprint for Operational Synergy

There is a notion that IT and OT teams are like oil and water. The two, even when inhabiting the same space, remain separate. Many companies treat the two teams this way. In doing so, they are missing an extraordinary opportunity: IT/OT collaboration. When thoughtful...

read more
IT/OT Convergence – the foundation of digital transition

IT/OT Convergence – the foundation of digital transition

In 2025, IT and OT teams in many organizations continue to work independently of one another. But there is a paradigm shift happening. The two, as they have been for years, continue to overlap. This convergence has become, as the title of this blog suggests, the...

read more
Understanding The Basics of OT asset management

Understanding The Basics of OT asset management

By following these basic principles, organizations can effectively manage their operational technology assets, ensure their reliability and security, and optimize the performance of their industrial processes.

read more

The big OT asset visibility misconception

You have heard it a dozen times: You cannot protect what you don’t see. You need asset visibility! Based on this trivial insight, OT security vendors usually explain how you can achieve such visibility with their products. Let’s check what that actually means in...

read more
Threat-centric vs. infrastructure-centric OT security

Threat-centric vs. infrastructure-centric OT security

There are two general approaches to OT security. One approach is threat-centric and attempts to identify and eliminate cyber threats in OT networks. The other approach is infrastructure-centric and largely doesn’t care about threats. Instead, it attempts to create a...

read more