Blog Articles
What is OT security execution, and why should you focus on it?
Progress requires an objective, a plan to reach that objective, and a means to measure how far you have come. All that is missing in the predominant OT security school of thought is primarily concerned with threat detection. If you spend more resources on that issue, you won’t see less threats; you will see more.
Beyond Fear, Uncertainty and Doubt: Making the case for OT resilience
Reliable operation of our critical infrastructure, manufacturing, and other highly automated industries is too important to leave it to companies living off instilling fear, uncertainty, and doubt. It’s time to approach the problem with a more rational, engineering-oriented approach. That’s what OT resilience is all about.
10 Steps To Building Your OT Resilience Strategy
Vulnerability Management: Identifying and assessing vulnerabilities, threats, and risks in OT systems and creating a risk-based inventory and alignment with IT systems. Developing risk management frameworks and plans to proactively mitigate the impact and likelihood...
Navigating Common Operational Technology Challenges for Oil and Gas Companies
As the world’s need for more energy sources keeps going up, oil and gas companies must work hard to keep their operations and critical infrastructure running smoothly and safely.
Don’t Get Caught Up in the Hype: A Practical Guide to Prioritizing Vulnerabilities for Maximum OT Resilience
It is a common misconception that in order to secure a system, the most recent vulnerability discovered must be addressed and mitigated. Unfortunately, this idea frequently results in the waste of resources that could instead be applied to vulnerabilities that pose a...
Using Automation to Resolve the False OT Security Skills ‘Shortage’
What if I told you that this alleged shortage isn’t actually one at all? It is a false perception brought about by outdated framing of OT security in the twenty-first century.
Streamlining Your Digital Transformation with OTbase Software
The process of navigating this transition is not an easy one; however, if you have the right guidance and the right tool, you can be up and running in no time at all.
How to boost your OT vulnerability management with one click
If you have tackled vulnerability management in OT, chances are you ended up in frustration. It is virtually impossible to keep up with the constant stream of new vulnerabilities. Why? Because in OT, we are faced with a huge cost for installing security patches and...
Active OT/ICS Asset Discovery: A journey from ignorance to insight
An excel spreadsheet is the starting point in almost every journey to master modern OT infrastructures. Control engineers attempt to store their knowledge about OT systems in an excel table so they and their coworkers understand the most important digital...