OT Security Blog Articles
Insights on Resilience, Vulnerability Management, and More
Combinatorial failure modes and coordinated malfunction: Why we need to upgrade safety wisdom in a digital world
If you are working in the field of industrial safety, you know two things to be true: Safety is built on solid engineering principles and has an incredibly successful track record. For complex environments, it is getting more and more difficult to fulfill the promise...
Tactical OT Security, or: how to make a difference at the execution level
Tactical OT security is an approach that can make your OT security efforts more effective. Here is how. If you are working in OT security, you will probably have noticed that most organizations struggle to gain any momentum with their security efforts. Some might not...
How can you get a solid OT/ICS security plan for free?
A leading cause of inefficient and frustrating OT security efforts is the lack of a top-down approach that starts with top management and a solid high-level cyber security plan. Such a plan is a comprehensive yet brief breakdown of all the major activities the...
Why a cyber strike against North Korean nuclear assets is unlikely
Several media people have inquired if we should expect a cyber strike against the North Korean nuclear program, or why such strike didn't happen already. Here is my answer. A cyber strike against North Korean nuclear assets is highly unlikely, and here is why. I don't...
Warum wir keine Netzwerkverkehrs-Anomalie-Erkennung in OT-BASE verwenden
OT-BASE ist unser strategisches Softwareprodukt, das den Kunden hilft, ein zuverlässiges und sicheres IIoT zu bauen und sicherzustellen, dass die IT / OT-Konvergenz effizient und glatt ist, anstatt ein Durcheinander.
Why we don’t use network traffic anomaly detection in OT-BASE
OT-BASE is our strategic software product that helps customers to build a reliable and safe IIoT, and to ensure that IT/OT convergence is efficient and smooth rather than a culture clash. In many
Another nuclear power plant adopts the RIPE OT Security Program
Finnish nuclear operator Fennovoima has adopted the RIPE OT Security Program for their Hanhikivi-1 nuclear power plant. The step is significant because the reactor is presently in the planning stage.
Energy giant Fortum rolls out RIPE OT security program to fleet of 400 power plants
In 2014, energy giant Fortum selected The Langner Group’s RIPE Program to provide a robust, comprehensive program for managing the cyber security of its nuclear power plants. Fortum was so
Two Steps to IIoT Security Nirvana
Yes, of course this is a simplification, but just because it’s obvious, does not mean it’s wrong. You can indeed begin your journey to IIoT security nirvana by adopting this simple two-step