How can you get a solid OT/ICS security plan for free?

A leading cause of inefficient and frustrating OT security efforts is the lack of a top-down approach that starts with top management and a solid high-level cyber security plan. Such a plan is a comprehensive yet brief breakdown of all the major activities the...

Why a cyber strike against North Korean nuclear assets is unlikely

Several media people have inquired if we should expect a cyber strike against the North Korean nuclear program, or why such strike didn’t happen already. Here is my answer. A cyber strike against North Korean nuclear assets is highly unlikely, and here is why. I...
Why we don’t use network traffic anomaly detection in OT-BASE

Why we don’t use network traffic anomaly detection in OT-BASE

OT-BASE is our strategic software product that helps customers to build a reliable and safe IIoT, and to ensure that IT/OT convergence is efficient and smooth rather than a culture clash. In many respects, the technology that we use in OT-BASE is quite different from...
Another nuclear power plant adopts the RIPE OT Security Program

Another nuclear power plant adopts the RIPE OT Security Program

Finnish nuclear operator Fennovoima has adopted the RIPE OT Security Program for their Hanhikivi-1 nuclear power plant. The step is significant because the reactor is presently in the planning stage. By incorporating the RIPE Program in the planning phase, Fennovoima...