OT Security Blog Articles
Insights on Resilience, Vulnerability Management, and More
Active OT/ICS Asset Discovery: A journey from ignorance to insight
An excel spreadsheet is the starting point in almost every journey to master modern OT infrastructures. Control engineers attempt to store their knowledge about OT systems in an excel table so they and their coworkers understand the most important digital...
How the Florida water hack shows everything wrong with OT security
The Florida water hack gives you a good idea of what OT security reality looks like -- and it's in stark contrast to the Kabuki theater performed by OT security vendors, the media, and the government. Let's break it down. ICS Detection is useless Over the last couple...
OT/ICS Firmware & Software Inventory Made Easy
Are you struggling with the development and maintenance of an OT firmware and software inventory? Most asset owners are using Excel for asset inventory. The problem with Excel is that in most spreadsheets you rarely see software or firmware details. You may see an OS,...
Introducing OT-BASE Asset Center 5
In the face of digital transformation, OT environments are becoming more complex, more connected, more vulnerable, and less transparent. The tools used to manage these environments need to be evolving even more quickly. That is why we are constantly pushing out new...
What is OT/ICS vulnerability management? What works, and what doesn’t
Understanding what OT vulnerability management is isn't difficult. Practicing it is what is difficult. So, let's get the easy part out of the way! What is a vulnerability? A vulnerability is a system weakness that, if exploited, will result in a breach of system...
What is OT/ICS asset management?
The following is a trascript of this video: OT asset management is sometimes viewed as one of the more boring subjects in industrial automation. The idea of maintaining an inventory of your OT devices, worst case done manually and involving periodic walk-down...
The Stuxnet Story
The following text is a transcript from the video with the same title: In 2007, an unidentified person submitted a code sample to the collaborative anti-virus platform Virustotal. Not recognized by any anti-virus company at the time, that code was...
Debunked: Why you don’t need ICS detection to detect new devices in your OT network
Rumor is spreading that an OT asset management system needs help from an ICS detection product in order to detect new devices in your networks. Let's correct this misconception. Silent devices Imagine that a network attached device stays silent. It doesn't...
A comprehensive guide to OT/ICS asset management
In this guide we outline what OT/ICS asset management is, what it can do for you, and why it is required for sustainable OT security. What is OT, and what is an asset? OT is an acronym for operations technology, which basically means digital technology used for...