OT Insights Center

Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.

Search
Blog

SCADA Security Fundamentals

Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure....
Blog

What is OT Network Monitoring?

How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges....
Blog

What Is ICS (Industrial Control System) Security?

How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices...
Podcast

Network Duct Tape – Episode 141

Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works....
Podcast

Credibility, not Likelihood – Episode 140

Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms....
Books and eBooks

Rethinking Secure Remote Access for Industrial and OT Networks

Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Blog

SCADA Security Fundamentals

Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure....
Blog

What is OT Network Monitoring?

How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges....
Blog

What Is ICS (Industrial Control System) Security?

How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices...
Blog

Unidirectional vs Bidirectional: Complete Integration Guide

Discover the key differences between unidirectional and bidirectional integration to choose the best approach for secure and efficient system connectivity....
Blog

What Is Industrial Control System Software?

This guide will walk you through everything you need to know about industrial control system software—from its fundamental components and core functionalities to the latest trends shaping its future....
Blog

What is OT Cybersecurity?

Learn what OT cybersecurity is, how it protects critical infrastructure, and the key threats, strategies, and standards you need to know....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Books and eBooks

Rethinking Secure Remote Access for Industrial and OT Networks

Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....
Books and eBooks

13 Ways to Break a Firewall

How much protection do firewalls really offer? Get the book to explore 13+ real-world attack scenarios that defeat firewalls and better designs for protecting industrial systems....
Books and eBooks

Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them

This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions....
Books and eBooks

Data Diodes vs. Unidirectional Gateways

Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them....
Books and eBooks

The 2025 OT Cyber Threat Report

The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments....
Books and eBooks

eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Case studies

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks....
Case studies

UAE Based Oil & Gas Refinery 

How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud....
Case studies

Securing a European TSO

Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats....
Case studies

Cybersecurity for LNG Ports

Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations....
Case studies

Unidirectional Protection For Railway Signaling Networks

Enabling 100% secure remote monitoring of rail signaling and control networks, enabling SOC and corporate IT systems with secure visibility into signaling networks....
Case studies

Enabling The Digital Refinery

Protecting critical equipment of a highly sensitive petrochemicals processing plant, while improving production performance with real-time, actionable, and predictive analytics....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Infographic

Infographic: 80 Years of Cyber

Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity, from the dawn of electronic computers to today’s hyper-connected world....
Infographic

Infographic: Top 10 OT Cyberattacks of 2024

Infographic mapping out the top 10 OT cyberattacks of 2024 including WHEN it happened, WHICH industry, WHAT happened and also covering the consequences and significance of each attack...
Infographic

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations. Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations....
Infographic

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted industrial operations, specifically Operational Technology (OT) and Industrial Controls Systems (ICS) that are commonly used within critical and important infrastructure....
Infographic

Ransomware Attack on Data Center Infrastructure (Infographic)

Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks....
Infographic

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Podcast

Network Duct Tape – Episode 141

Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works....
Podcast

Credibility, not Likelihood – Episode 140

Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms....
Podcast

Lessons Learned From Incident Response – Episode 139

Tune in to 'Lessons Learned From Incident Response', the latest episode of Waterfall Security's OT cybersecurity Podcast....
Podcast

Experience & Challenges Using Asset Inventory Tools – Episode 138

In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use inventory tools - different kinds of tools in different environments - which have become almost ubiquitous as main offerings or add-ons to OT security solutions....
Podcast

Needles in Haystacks – Recruiting OT Incident Responders – Episode 137

OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role....
Podcast

Would You Rather Use a Control System That’s Proven Correct? – Episode 136

Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Video

13 Ways to Break a Firewall (and alternatives for OT security)

Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems....
Video

Risks, Rules & Gaps: The Latest on NIS2 and CRA

Watch the webinar where we’ll look at the latest developments in member state legislation to comply with NIS2 and CRA....
Video

Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

Safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds? Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE)....
Video

Building a Game Plan for OT Remote Access

OT remote access is seen as essential for many industries, but there are a variety of OT solutions out there. Watch the webinar as we help you make the right decision for your OT network....
Video

Unpacking the 2025 OT Cyber Threat Report

Watch the webinar that unpacks Waterfall's 2025 OT Cyber Threat Report and understand today's OT cyber threat landscape....
Video

‘Credibility’ vs. ‘Likelihood’ in OT Security

Watch the webinar to explore and weigh in on a cutting-edge debate that is likely to change forever how we think about high-consequence threats....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Consult with a unidirectional
solutions architect