OT Insights Center
Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.
- All
- Blog
- Books and eBooks
- Case studies
- Infographic
- Podcast
- Video
59,60,63,480,494,495,496,546,-1
Video
Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers
Data from 2023 shows a continual increase in cyber attacks shutting down or even damaging manufacturing operations. The…
Read more
Blog
The 2024 Threat Report – At a Glance
The joint Waterfall and ISSSource 2024 Threat Report covers year-on-year attack trends to see where we are headed…
Read more
Blog
OT Cybersecurity: Can the Government Save Us?
Governments play an important role in OT security: they educate, they share threat information, they vet our employees…
Read more
Podcast
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A at the end of the Threat Report also includes the entire dataset used for the report…
Read more
Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more
Blog
OT Security: Are We Protecting the Information?
Engineers are also uneasy with the focus on detect, respond, and recover activities. Hoping that we can detect…
Read more
Webinar
Engineering-Grade IEC 62443 - A Guide For Power Generation
IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others…
Read more
Blog
The 2024 Threat Report – At a Glance
The joint Waterfall and ISSSource 2024 Threat Report covers year-on-year attack trends to see where we are headed…
Read more
Blog
OT Cybersecurity: Can the Government Save Us?
Governments play an important role in OT security: they educate, they share threat information, they vet our employees…
Read more
Blog
OT Security: Are We Protecting the Information?
Engineers are also uneasy with the focus on detect, respond, and recover activities. Hoping that we can detect…
Read more
Blog
Adding Industrial Connectivity Without Adding Cyber Risk
As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the…
Read more
Blog
IT vs. OT Differences, Superficial vs. Fundamental
To learn more about consequence-driven designs for critical OT networks, click here to request a free copy of…
Read more
Blog
How to Properly Cyber Secure an Upstream Oil & Gas Operation
Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security…
Read more
Blog
OT Security Solutions: Exploring Technologies
In conclusion, the significance of OT security solutions cannot be overstated in today's interconnected world. Waterfall Security Solutions…
Read more
Blog
Keeping the Flow: Cyber-Proofing Oil & Gas Production
An expanding desire for O&G companies is the ability to leverage their industrial data in order to perform…
Read more
Blog
How Are OT Hackers Getting IN Today?
Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more
Blog
The 2023 Threat Report – At a Glance
The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more
Blog
NIS2 and Its Impact on Operational Technology Cybersecurity
The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more
Blog
9 Cybersecurity Challenges for Critical Water Infrastructure
In recent years, the issue of cybersecurity for vital water infrastructure has become a growing concern worldwide. Water…
Read more
Blog
Water Utility Hacking 101
Water is life! Water is probably the most important resource for maintaining society and order. It’s easy to…
Read more
Blog
Segmentation 202: Unidirectional Architectures
This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more
Blog
OT Risk Management: Getting Started and Assigning Risk
OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more
Blog
CISA ICSJWG Event - A Lot to Look Forward To
The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more
Blog
The 2024 Threat Report – At a Glance
The joint Waterfall and ISSSource 2024 Threat Report covers year-on-year attack trends to see where we are headed…
Read more
Blog
OT Cybersecurity: Can the Government Save Us?
Governments play an important role in OT security: they educate, they share threat information, they vet our employees…
Read more
Blog
OT Security: Are We Protecting the Information?
Engineers are also uneasy with the focus on detect, respond, and recover activities. Hoping that we can detect…
Read more
Blog
Adding Industrial Connectivity Without Adding Cyber Risk
As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the…
Read more
Blog
IT vs. OT Differences, Superficial vs. Fundamental
To learn more about consequence-driven designs for critical OT networks, click here to request a free copy of…
Read more
Blog
How to Properly Cyber Secure an Upstream Oil & Gas Operation
Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security…
Read more
Blog
OT Security Solutions: Exploring Technologies
In conclusion, the significance of OT security solutions cannot be overstated in today's interconnected world. Waterfall Security Solutions…
Read more
Blog
Keeping the Flow: Cyber-Proofing Oil & Gas Production
An expanding desire for O&G companies is the ability to leverage their industrial data in order to perform…
Read more
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A at the end of the Threat Report also includes the entire dataset used for the report…
Read more
Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more
Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
Books and eBooks
Cybersecurity for the rail industry eBook
The safety imperative in railConnectivity at the operations control centerManaging cybersecurity in vital networksUnidirectional gateways vs. FirewallsA reference…
Read more
Books and eBooks
NIS2 Compliance Guide for OT systems
Introduction to NIS2 DirectiveFrom NISD to NIS2. Why a new regulation?Best practices and controls for OT professionals to…
Read more
Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
Books and eBooks
The New Era of Cyber Insurance
Progress-in-Work A: Insurance CyberCatastrophes CyberDiligence DueRisks Cyber ReducingLearned Lessons
Read more
Case studies
Cybersecurity for Government Networks
Defending Critical Government Operations From Cyber Threats Customer:A Government Security Agency in Asia-Pacific Customer Requirement:Enable real-time transfer…
Read more
Case studies
UAE Based Oil & Gas Refinery
100% Secure: Customer's OT remains physically unbreachable to any remote threats. Real-time Data Visibility: Customer now has full, real-time…
Read more
Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Case studies
Cybersecurity for LNG Ports
Cybersecurity Is A Business Imperative For Lng Ports And Terminals
Read more
Case studies
Unidirectional Protection For Railway Signaling Networks
Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the…
Read more
Case studies
Enabling The Digital Refinery
Refining & Petrochemicals Processing Modernization And Containing Remote Cyber Threats
Read more
Case studies
Securing Pharmaceutical Manufacturing Systems and Intellectual Property
Cyber Risks To Pharmaceutical Manufacturing
Read more
Case studies
Protecting the GIPL pipeline
Cross border pipeline infrastructure is facing real cyber threats
Read more
Case studies
Cybersecurity for Government Networks
Defending Critical Government Operations From Cyber Threats Customer:A Government Security Agency in Asia-Pacific Customer Requirement:Enable real-time transfer…
Read more
Case studies
UAE Based Oil & Gas Refinery
100% Secure: Customer's OT remains physically unbreachable to any remote threats. Real-time Data Visibility: Customer now has full, real-time…
Read more
Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Case studies
Cybersecurity for LNG Ports
Cybersecurity Is A Business Imperative For Lng Ports And Terminals
Read more
Case studies
Unidirectional Protection For Railway Signaling Networks
Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the…
Read more
Case studies
Enabling The Digital Refinery
Refining & Petrochemicals Processing Modernization And Containing Remote Cyber Threats
Read more
Case studies
Securing Pharmaceutical Manufacturing Systems and Intellectual Property
Cyber Risks To Pharmaceutical Manufacturing
Read more
Case studies
Protecting the GIPL pipeline
Cross border pipeline infrastructure is facing real cyber threats
Read more
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A at the end of the Threat Report also includes the entire dataset used for the report…
Read more
Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more
Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
Books and eBooks
Cybersecurity for the rail industry eBook
The safety imperative in railConnectivity at the operations control centerManaging cybersecurity in vital networksUnidirectional gateways vs. FirewallsA reference…
Read more
Books and eBooks
NIS2 Compliance Guide for OT systems
Introduction to NIS2 DirectiveFrom NISD to NIS2. Why a new regulation?Best practices and controls for OT professionals to…
Read more
Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
Books and eBooks
The New Era of Cyber Insurance
Progress-in-Work A: Insurance CyberCatastrophes CyberDiligence DueRisks Cyber ReducingLearned Lessons
Read more
Infographic
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks
Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.
Read more
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
Infographic
Ransomware Attack on Data Center Infrastructure (Infographic)
As data centers grow in importance, scale, and complexity, so do the security challenges they face. Among the…
Read more
Infographic
Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector
As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more
Infographic
Oil and Gas Cyber Attacks
Our exclusive infographic explores the top 6 cyber attacks on oil & gas industries in the last decade.…
Read more
Infographic
Cyber Attacks On Critical Infrastructure
Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more
Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Cyber Attacks On Critical Infrastructure
Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more
Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks
Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.
Read more
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
Infographic
Ransomware Attack on Data Center Infrastructure (Infographic)
As data centers grow in importance, scale, and complexity, so do the security challenges they face. Among the…
Read more
Infographic
Oil and Gas Cyber Attacks
Our exclusive infographic explores the top 6 cyber attacks on oil & gas industries in the last decade.…
Read more
Podcast
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more
Podcast
Cybersecurity in the AVEVA Enterprise SCADA Product – Going Deep | Episode 122
Jake Hawkes is a Senior Product Manager at AVEVA with over 20 years of SCADA experience. Jake has…
Read more
Podcast
What’s Next? A Decision Support Tool for Industrial Security | Episode 121
Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
Podcast
USB Firmware Attack | Episode 120
Mario Prieto Sanlés is a pre-sales engineer at AuthUSB, a Spain-based company that sells hardware and software tools…
Read more
Podcast
Managing Trust in Massive IIoT Systems | Episode 119
Transcript of this podcast episode #119: Managing trust in massive IIoT SystemsPlease note: This transcript was auto-generated and then edited…
Read more
Podcast
Making the Move into OT Security | Episode 118
Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Podcast
Building Trust to Cooperate at the EE-ISAC | Episode 117
Transcript of this podcast episode #117: Building Trust to Cooperate - at the EE-ISACPlease note: This transcript was auto-generated and…
Read more
Podcast
Failures of Imagination - from 9-11 to The Aurora Test | Episode 116
Aaron Turner...go down the path some like this How how often does it actually work and we really…
Read more
Podcast
Risk in Context: When to Patch, When to Let It Ride | Episode 109
In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more
Podcast
Hacking the CANbus | Episode 108
In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more
Podcast
Saving Money and Effort Automating Compliance | Episode 107
In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more
Podcast
How Cyber Fits Into Big-Picture Risk | Episode 106
In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more
Podcast
Six Steps to Integrating IT & OT in Mining | Episode 105
In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more
Podcast
Jesus Molina on the Biden National Cyber Strategy
The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more
Podcast
Shining a Light into the Dark for Oil and Gas Cybersecurity | Episode #103
Getting an industrial site started on the cybersecurity road can be hard. In the Oil & Gas industry,…
Read more
Podcast
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more
Podcast
Cybersecurity in the AVEVA Enterprise SCADA Product – Going Deep | Episode 122
Jake Hawkes is a Senior Product Manager at AVEVA with over 20 years of SCADA experience. Jake has…
Read more
Podcast
What’s Next? A Decision Support Tool for Industrial Security | Episode 121
Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
Podcast
USB Firmware Attack | Episode 120
Mario Prieto Sanlés is a pre-sales engineer at AuthUSB, a Spain-based company that sells hardware and software tools…
Read more
Podcast
Managing Trust in Massive IIoT Systems | Episode 119
Transcript of this podcast episode #119: Managing trust in massive IIoT SystemsPlease note: This transcript was auto-generated and then edited…
Read more
Podcast
Making the Move into OT Security | Episode 118
Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Podcast
Building Trust to Cooperate at the EE-ISAC | Episode 117
Transcript of this podcast episode #117: Building Trust to Cooperate - at the EE-ISACPlease note: This transcript was auto-generated and…
Read more
Podcast
Failures of Imagination - from 9-11 to The Aurora Test | Episode 116
Aaron Turner...go down the path some like this How how often does it actually work and we really…
Read more
Video
Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers
Data from 2023 shows a continual increase in cyber attacks shutting down or even damaging manufacturing operations. The…
Read more
Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Video
Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar
We covered a range of topics in the webinar, including: The steady evolution of OT cyber incidents with…
Read more
Video
Engineering-Grade Cybersecurity for Water Utilities | Recorded Webinar
Rees Machtemes and Andrew Ginter guide us through the latest trends and recent incidents of the cyber threat environment…
Read more
Video
Rail System Cybersecurity | Recorded Webinar
Chris Crawford and Andrew Ginter walk us through the new TSA cybersecurity directives, while taking a look at…
Read more
Video
Rail Cybersecurity - New Solution for an Old Industry | Recorded Webinar
About the Recorded Webinar In this presentation, viewers will be introduced to Christopher Crawford, a renowned thought leader…
Read more
Video
Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar
This webinar segment originally aired during the CS2AI Symposium: Industrial Security Road Trip blockbuster event. In it, Rees…
Read more
Video
Waterfall Security at TOGC 2023 in Istanbul
WATCH: Naoufal Kerboute, Regional Sales Director – Middle East, Turkey & North Africa answers questions about Waterfall Security’s…
Read more
Video
Evolving TSA Pipeline Security Directives | Recorded Webinar
Andrew Ginter explores the evolution of the TSA's directives for pipeline cybersecurity, as well as explaining their reasoning.https://www.youtube.com/watch?v=A2YXPNXU0AcFor…
Read more
Video
Unidirectional Cloud Gateway for Rail | Waterfall & Alstom
Watch as Eddy Thésée, Vice President Cybersecurity at Alstom, and Lior Frenkel, CEO and Co-Founder at Waterfall, discuss…
Read more
Video
Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek
Managing OT cyber risk is more than cybersecurity - an IT-SEC only approach ignores powerful engineering tools for…
Read more
Video
Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers
Data from 2023 shows a continual increase in cyber attacks shutting down or even damaging manufacturing operations. The…
Read more
Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Video
Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar
We covered a range of topics in the webinar, including: The steady evolution of OT cyber incidents with…
Read more
Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more
Webinar
Engineering-Grade IEC 62443 - A Guide For Power Generation
IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others…
Read more
Webinar
Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along…
Read more
Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more
Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more
Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more
Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more
Webinar
Engineering-Grade IEC 62443 - A Guide For Power Generation
IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others…
Read more
Webinar
Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along…
Read more
Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more
Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more
Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more
Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Facilities
The Challenges of Safeguarding Data Center Infrastructure
In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security.…
September 5, 2023
Read more
Manufacturing
Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers
Data from the past year shows a continual increase in cyber attacks shutting down or even damaging manufacturing…
March 26, 2024
Read more
OT cybersecurity insights center
The 2024 Threat Report – At a Glance
Cyber attacks impacting physical operations, like shut-downs, are rising. Waterfall’s NEW annual threat report provides industrial operators with…
March 24, 2024
Read more
Government and Defense
OT Cybersecurity: Can the Government Save Us?
Governments play an important role in OT security: they educate, they share threat information, they vet our employees…
March 21, 2024
Read more
OT cybersecurity insights center
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Precision farming is heavily automated, as are the "food factories" essential to feeding the world's population. Marcus Sachs…
March 18, 2024
Read more
OT cybersecurity insights center
2024 Threat Report – OT Cyberattacks with Physical Consequences
Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in…
March 17, 2024
Read more
OT cybersecurity insights center
Cyber Attacks with Physical Consequences – 2024 Threat Report
March 17, 2024
Read more
OT cybersecurity insights center
OT Security: Are We Protecting the Information?
Industrial network engineers have always been uneasy with the task of "protecting information". The real priority for OT…
March 7, 2024
Read more
Power
Engineering-Grade IEC 62443 - A Guide For Power Generation
Join our upcoming webinar and learn about the IEC 62243 standard for powergen, how CIE can help with…
March 5, 2024
Read more
Trending posts
The 2024 Threat Report – At a Glance
March 24, 2024
OT Cybersecurity: Can the Government Save Us?
March 21, 2024
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox