OT Insights Center
Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.
Blog
SCADA Security Fundamentals
Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure....
Blog
What is OT Network Monitoring?
How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges....
Blog
What Is ICS (Industrial Control System) Security?
How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices...
Podcast
Network Duct Tape – Episode 141
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works....
Podcast
Credibility, not Likelihood – Episode 140
Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms....
Books and eBooks
Rethinking Secure Remote Access for Industrial and OT Networks
Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Blog
SCADA Security Fundamentals
Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure....
Blog
What is OT Network Monitoring?
How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges....
Blog
What Is ICS (Industrial Control System) Security?
How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices...
Blog
Unidirectional vs Bidirectional: Complete Integration Guide
Discover the key differences between unidirectional and bidirectional integration to choose the best approach for secure and efficient system connectivity....
Blog
What Is Industrial Control System Software?
This guide will walk you through everything you need to know about industrial control system software—from its fundamental components and core functionalities to the latest trends shaping its future....
Blog
What is OT Cybersecurity?
Learn what OT cybersecurity is, how it protects critical infrastructure, and the key threats, strategies, and standards you need to know....
Trending posts
Lessons Learned From Incident Response – Episode 139
July 9, 2025
How Industrial Cybersecurity Works in 2025
June 29, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Books and eBooks
Rethinking Secure Remote Access for Industrial and OT Networks
Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....
Books and eBooks
13 Ways to Break a Firewall
How much protection do firewalls really offer? Get the book to explore 13+ real-world attack scenarios that defeat firewalls and better designs for protecting industrial systems....
Books and eBooks
Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them
This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions....
Books and eBooks
Data Diodes vs. Unidirectional Gateways
Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them....
Books and eBooks
The 2025 OT Cyber Threat Report
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments....
Books and eBooks
eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks....
Case studies
UAE Based Oil & Gas Refinery
How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud....
Case studies
Securing a European TSO
Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats....
Case studies
Cybersecurity for LNG Ports
Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations....
Case studies
Unidirectional Protection For Railway Signaling Networks
Enabling 100% secure remote monitoring of rail signaling and control networks, enabling SOC and corporate IT systems with secure visibility into signaling networks....
Case studies
Enabling The Digital Refinery
Protecting critical equipment of a highly sensitive petrochemicals processing plant, while improving production performance with real-time, actionable, and predictive analytics....
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity, from the dawn of electronic computers to today’s hyper-connected world....
Infographic
Infographic: Top 10 OT Cyberattacks of 2024
Infographic mapping out the top 10 OT cyberattacks of 2024 including WHEN it happened, WHICH industry, WHAT happened and also covering the consequences and significance of each attack...
Infographic
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks
Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations. Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations....
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted industrial operations, specifically Operational Technology (OT) and Industrial Controls Systems (ICS) that are commonly used within critical and important infrastructure....
Infographic
Ransomware Attack on Data Center Infrastructure (Infographic)
Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks....
Trending posts
Building a Game Plan for OT Remote Access
March 17, 2025
Unpacking the 2025 OT Cyber Threat Report
February 26, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Podcast
Network Duct Tape – Episode 141
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works....
Podcast
Credibility, not Likelihood – Episode 140
Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms....
Podcast
Lessons Learned From Incident Response – Episode 139
Tune in to 'Lessons Learned From Incident Response', the latest episode of Waterfall Security's OT cybersecurity Podcast....
Podcast
Experience & Challenges Using Asset Inventory Tools – Episode 138
In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use inventory tools - different kinds of tools in different environments - which have become almost ubiquitous as main offerings or add-ons to OT security solutions....
Podcast
Needles in Haystacks – Recruiting OT Incident Responders – Episode 137
OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role....
Podcast
Would You Rather Use a Control System That’s Proven Correct? – Episode 136
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems....
Trending posts
The world needs CIE. CIE needs you.
February 24, 2025
‘Credibility’ vs. ‘Likelihood’ in OT Security
February 2, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Video
13 Ways to Break a Firewall (and alternatives for OT security)
Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems....
Video
Risks, Rules & Gaps: The Latest on NIS2 and CRA
Watch the webinar where we’ll look at the latest developments in member state legislation to comply with NIS2 and CRA....
Video
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering
Safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds? Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE)....
Video
Building a Game Plan for OT Remote Access
OT remote access is seen as essential for many industries, but there are a variety of OT solutions out there. Watch the webinar as we help you make the right decision for your OT network....
Video
Unpacking the 2025 OT Cyber Threat Report
Watch the webinar that unpacks Waterfall's 2025 OT Cyber Threat Report and understand today's OT cyber threat landscape....
Video
‘Credibility’ vs. ‘Likelihood’ in OT Security
Watch the webinar to explore and weigh in on a cutting-edge debate that is likely to change forever how we think about high-consequence threats....
Trending posts
Learning From 2024’s Top OT Attacks and Planning for 2025’s Security
February 2, 2025
Finally, An OT Security Approach That Works
January 23, 2025
Why Understanding OT Attacks Is Important
January 13, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox