OT Security Blog Articles

Insights on Resilience, Vulnerability Management, and More

Threat-centric vs. infrastructure-centric OT security

Threat-centric vs. infrastructure-centric OT security

There are two general approaches to OT security. One approach is threat-centric and attempts to identify and eliminate cyber threats in OT networks. The other approach is infrastructure-centric and largely doesn’t care about threats. Instead, it attempts to create a...

read more
Compound OT security gains

Compound OT security gains

Guess what, the biggest problem in OT security isn’t the ever changing threat landscape. It’s the inefficiency of popular OT security strategies and processes. Why inefficient? Simply because they don’t pay any long-term dividends. Your OT threat detection efforts...

read more
OT Asset Management in 2024: A product category in its own right

OT Asset Management in 2024: A product category in its own right

Back in 2017 when we launched the OTbase software product, we were wondering how to label it. The initial idea was to call it an “OT management system”. That seemed to resonate with nobody. We then switched to “OT asset management software”, which was a little more...

read more
The OT cyber risk they didn’t tell you about

The OT cyber risk they didn’t tell you about

When you have spent some time in operations technology in the last decade, it is practically impossible that you hadn’t been informed about cyber risk: The risk of falling victim to evil hackers who have no problem messing up your vulnerable-ridden OT infrastructure...

read more