OT Security Blog Articles
Insights on Resilience, Vulnerability Management, and More
OT/ICS Asset Inventory using Elasticsearch
Elasticsearch can index all kinds of complex documents, so you may wonder if it can also be used as an asset inventory. The simple answer is: Yes, certainly. In this article we'll explain how you can replicate an inventory maintained in the OT-BASE Asset Management...
Indegy’s frivolous PLC version control patent
Last week OT detection vendor Indegy announced that they have been granted a patent by the U.S. Patent and Trademark Office for PLC version control. Yes, you heard that right: PLC version control, a technology that is around for approximately two decades, is now...
Why you shouldn’t go for automatic security updates of your OT/ICS infrastructure
Vulnerability management in ICS environments is making progress due to the availability of automated software and firmware inventories. Now once you have a good picture of the known vulnerabilities that affect your installed base, wouldn't it be a good idea to...
What does “insecure by design” actually mean for OT/ICS security?
One of the reasons why vulnerability and patch management is different in OT as compared to IT is the fact that the majority of OT products, technologies, and designs are insecure by design. If you are new to OT security, you might wonder what that actually means, and...
The five things you need to know about OT/ICS vulnerability and patch management
Vulnerability and patch management are getting traction in OT, so let's have a look at what they do, and what they don't do in 2019. 1. Technology has improved but is far from perfect In order to check which known vulnerabilities affect your installed base, you first...
Why OT asset discovery and network anomaly detection are two different things
The OT security market is expanding, which is certainly a good thing as for so many years asset owners had been left with just a handful of vendors and products. Over the last two or three years, one could see well over thirty viable products hitting the marketplace....
The three OT security / OT asset management market categories in 2019
If you are shopping for an OT security / OT asset management solution in 2019, you have the luxury -- or the burden -- to pick your choice between literally dozens of products. Not an easy choice to make, considering that you will most likely have to stick with it for...
Why Ethernet/IP changes the OT asset discovery game
Ethernet/IP has become the predominant industrial network protocol, which is good news for everybody attempting to implement comprehensive asset management for OT. If you are using Ethernet/IP, it's fair to say that you're in the best position to solve the asset...
Why you need an OT/ICS software inventory, and how to build one
In OT security circles we are recently witnessing a myopic fixation on one single security control: Network anomaly detection (NAD). As any cyber security practitioner can tell you, NAD is not a cure for all diseases, and you are going need more than a truckload of...