OT Security Blog Articles
Insights on Resilience, Vulnerability Management, and More
The simple truth why ICS detection / passive scanning can’t scale
"Products from current leaders such as Claroty and Nozomi Networks, as well as CyberX, Indegy and about 15 other competitors, are not what ICS asset owners actually want or need. They (...) will only be accepted as a product offering for the next 1 – 3 years." So...
OT/ICS policy and governance in 2019: Three factors for success
OT security experts agree that without systematic security policy and governance, an organization will never achieve sustainability in their efforts to continuously raise the security bar. Yet the sad reality is that for the vast majority of organizations that do...
OT/ICS Asset Inventory using Elasticsearch
Elasticsearch can index all kinds of complex documents, so you may wonder if it can also be used as an asset inventory. The simple answer is: Yes, certainly. In this article we'll explain how you can replicate an inventory maintained in the OTbase Asset Management...
Indegy’s frivolous PLC version control patent
Last week OT detection vendor Indegy announced that they have been granted a patent by the U.S. Patent and Trademark Office for PLC version control. Yes, you heard that right: PLC version control, a technology that is around for approximately two decades, is now...
Why you shouldn’t go for automatic security updates of your OT/ICS infrastructure
Vulnerability management in ICS environments is making progress due to the availability of automated software and firmware inventories. Now once you have a good picture of the known vulnerabilities that affect your installed base, wouldn't it be a good idea to...
What does “insecure by design” actually mean for OT/ICS security?
One of the reasons why vulnerability and patch management isdifferent in OT as compared to IT is the fact that the majority of OT products,technologies, and designs are insecure bydesign. If you are new to OT security, you might wonder what that actuallymeans, and...
The five things you need to know about OT/ICS vulnerability and patch management
Vulnerability and patch management are getting traction in OT, so let's have a look at what they do, and what they don't do in 2019. 1. Technology has improved but is far from perfect In order to check which known vulnerabilities affect your installed base, you first...
Why OT asset discovery and network anomaly detection are two different things
The OT security market is expanding, which is certainly a good thing as for so many years asset owners had been left with just a handful of vendors and products. Over the last two or three years, one could see well over thirty viable products hitting the marketplace....
The three OT security / OT asset management market categories in 2019
If you are shopping for an OT security / OT asset management solution in 2019, you have the luxury -- or the burden -- to pick your choice between literally dozens of products. Not an easy choice to make, considering that you will most likely have to stick with it for...