OT Security Blog Articles

Insights on Resilience, Vulnerability Management, and More

Lack of Cyber Imagination

The 9/11 Commission noted several failures that led to that fateful day, but they emphasized that “The most important failure was one of imagination.” It’s been thirteen years and one could

read more

Who's Smarter, Hackers or Defenders?

I am sometimes befuddled at just how much press (negative and otherwise) hackers receive. Truth be told, perhaps my befuddlement contains just a twinge of jealousy (okay, maybe more than a twinge).

read more

IT vs. ICS: An Attacker's Perspective

There are extensive treatments of the similarities and differences between information technology (IT) systems and industrial control systems (ICS), but these differences are more than just academic

read more

Five Steps to Critical Penetration Analysis

Penetration tests (pentests) have gained recognition as a legitimate approach to identifying and then in theory, mitigating discovered weaknesses. The pentest industry even has a magazine (PenTest

read more
RIPE brochure available for download

RIPE brochure available for download

Our new RIPE brochure, highlighting the characteristics and benefits of the RIPE Cyber Security and Robustness Program, is available for download (PDF): English language version German language

read more