OT Insights Center
Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.
Podcast
				Managing Risk with Digital Twins – What Do We Do Next? – Episode 144
					How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions....				
				Books and eBooks
				IT & OT Relationship Management
					In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about the problem. Most of that writing misses the point. In most cases, the relationship problem can be resolved with a little clarity, a bit more good will, and a modicum of mutual education....				
				Upcoming webinars
				Analyzing Recent NIS2 Regulations – OT security is changing
					One EU nation after another is releasing new regulations for their energy infrastructures to comply with the NIS2 directive. Jørgen Hartig of SecuriOT in Denmark joins us to look at the recent Danish, Norwegian, Finnish and other rules....				
				Podcast
				I don’t sign s**t – Episode 143
					Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do....				
				Blog
				Secure Industrial Remote Access Solutions
					Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations....				
				Trending posts
NIS2 and the Cyber Resilience Act (CRA) – Episode 142
					
			August 18, 2025		
				
				SCADA Security Fundamentals
					
			August 14, 2025		
				
				Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Blog
				Secure Industrial Remote Access Solutions
					Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations....				
				Blog
				SCADA Security Fundamentals
					Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure....				
				Blog
				What is OT Network Monitoring?
					How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges....				
				Blog
				What Is ICS (Industrial Control System) Security?
					How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices...				
				Blog
				Unidirectional vs Bidirectional: Complete Integration Guide
					Discover the key differences between unidirectional and bidirectional integration to choose the best approach for secure and efficient system connectivity....				
				Trending posts
Network Duct Tape – Episode 141
					
			August 13, 2025		
				
				Credibility, not Likelihood – Episode 140
					
			August 6, 2025		
				
				Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Books and eBooks
				IT & OT Relationship Management
					In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about the problem. Most of that writing misses the point. In most cases, the relationship problem can be resolved with a little clarity, a bit more good will, and a modicum of mutual education....				
				Books and eBooks
				Rethinking Secure Remote Access for Industrial and OT Networks
					Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....				
				Books and eBooks
				13 Ways to Break a Firewall
					How much protection do firewalls really offer? Get the book to explore 13+ real-world attack scenarios that defeat firewalls and better designs for protecting industrial systems....				
				Books and eBooks
				Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them
					This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions....				
				Books and eBooks
				Data Diodes vs. Unidirectional Gateways
					Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them....				
				Books and eBooks
				The 2025 OT Cyber Threat Report
					The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments....				
				Trending posts
What Is Industrial Control System Software?
					
			July 16, 2025		
				
				Lessons Learned From Incident Response – Episode 139
					
			July 9, 2025		
				
				Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Case studies
				Cybersecurity for Government Networks
					Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks....				
				Case studies
				UAE Based Oil & Gas Refinery
					How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud....				
				Case studies
				Securing a European TSO
					Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats....				
				Case studies
				Cybersecurity for LNG Ports
					Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations....				
				Case studies
				Unidirectional Protection For Railway Signaling Networks
					Enabling 100% secure remote monitoring of rail signaling and control networks, enabling SOC and corporate IT systems with secure visibility into signaling networks....				
				Case studies
				Enabling The Digital Refinery
					Protecting critical equipment of a highly sensitive petrochemicals processing plant, while improving production performance with real-time, actionable, and predictive analytics....				
				Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Infographic
				Infographic: 80 Years of Cyber
					Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity, from the dawn of electronic computers to today’s hyper-connected world....				
				Infographic
				Infographic: Top 10 OT Cyberattacks of 2024
					Infographic mapping out the top 10 OT cyberattacks of 2024 including WHEN it happened, WHICH industry, WHAT happened and also covering the consequences and significance of each attack...				
				Infographic
				Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks
					Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations. Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations....				
				Infographic
				Top 10 Cyberattacks of 2023
					2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted industrial operations, specifically Operational Technology (OT) and Industrial Controls Systems (ICS) that are commonly used within critical and important infrastructure....				
				Infographic
				Ransomware Attack on Data Center Infrastructure (Infographic)
					Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks....				
				Trending posts
Cross Domain Solutions Explained
					
			June 12, 2025		
				
				Risks, Rules & Gaps: The Latest on NIS2 and CRA
					
			June 3, 2025		
				
				Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Podcast
				Managing Risk with Digital Twins – What Do We Do Next? – Episode 144
					How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions....				
				Podcast
				I don’t sign s**t – Episode 143
					Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do....				
				Podcast
				NIS2 and the Cyber Resilience Act (CRA) – Episode 142
					NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kieffer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators....				
				Podcast
				Network Duct Tape – Episode 141
					Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works....				
				Podcast
				Credibility, not Likelihood – Episode 140
					Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms....				
				Podcast
				Lessons Learned From Incident Response – Episode 139
					Tune in to 'Lessons Learned From Incident Response', the latest episode of Waterfall Security's OT cybersecurity Podcast....				
				Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Video
				Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation
					Learn how secure access can enhance both safety and performance in renewable energy operations....				
				Video
				The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next
					What’s driving the sudden surge in OT capable malware? Who’s behind these threats and how should our defenses evolve to keep pace?...				
				Video
				13 Ways to Break a Firewall (and alternatives for OT security)
					Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems....				
				past webinars
				Risks, Rules & Gaps: The Latest on NIS2 and CRA
					Watch the webinar where we’ll look at the latest developments in member state legislation to comply with NIS2 and CRA....				
				Video
				Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering
					Safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds? Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE)....				
				Video
				Building a Game Plan for OT Remote Access
					OT remote access is seen as essential for many industries, but there are a variety of OT solutions out there. Watch the webinar as we help you make the right decision for your OT network....				
				Trending posts
Unpacking the 2025 OT Cyber Threat Report
					
			February 26, 2025		
				
				The world needs CIE. CIE needs you.
					
			February 24, 2025		
				
				Needles in Haystacks – Recruiting OT Incident Responders – Episode 137
					
			February 13, 2025		
				
				Stay up to date
Subscribe to our blog and receive insights straight to your inbox
 Power
                                                        Power                         Oil & Gas
                                                        Oil & Gas                         Water & Wastewater
                                                        Water & Wastewater                         Manufacturing
                                                        Manufacturing                         Facilities
                                                        Facilities                         Transportation
                                                        Transportation                         Metals & Mining
                                                        Metals & Mining                         Government and Defense
                                                        Government and Defense                         
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								