OT Insights Center

Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.

Search
  • All
  • Blog
  • Books and eBooks
  • Case studies
  • Infographic
  • Podcast
  • Video
Industrial Connectivity without cyber risk

Adding Industrial Connectivity Without Adding Cyber Risk

As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the…
Read more
Government Network Cybersecurity

Cybersecurity for Government Networks

Defending Critical LNG Import Terminals From Cyber Threats Customer: A Government Security Agency in Asia-Pacific Customer Requirement:…
Read more
ebook on how to protect government networks from cyberthreats

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more
IT vs. OT Differences, Superficial vs. Fundamental

IT vs. OT Differences, Superficial vs. Fundamental

To learn more about consequence-driven designs for critical OT networks, click here to request a free copy of…
Read more
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.
Read more
How to Properly Cyber Secure an Upstream Oil & Gas Operation

How to Properly Cyber Secure an Upstream Oil & Gas Operation

Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security…
Read more
OT Security Solutions

OT Security Solutions: Exploring Technologies

In conclusion, the significance of OT security solutions cannot be overstated in today's interconnected world. Waterfall Security Solutions…
Read more

Engineering-grade OT Security - A Manager's Guide

Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
Industrial Connectivity without cyber risk

Adding Industrial Connectivity Without Adding Cyber Risk

As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the…
Read more
IT vs. OT Differences, Superficial vs. Fundamental

IT vs. OT Differences, Superficial vs. Fundamental

To learn more about consequence-driven designs for critical OT networks, click here to request a free copy of…
Read more
How to Properly Cyber Secure an Upstream Oil & Gas Operation

How to Properly Cyber Secure an Upstream Oil & Gas Operation

Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security…
Read more
OT Security Solutions

OT Security Solutions: Exploring Technologies

In conclusion, the significance of OT security solutions cannot be overstated in today's interconnected world. Waterfall Security Solutions…
Read more
Cyberproofing Oil and Gas Production

Keeping the Flow:  Cyber-Proofing Oil & Gas Production

An expanding desire for O&G companies is the ability to leverage their industrial data in order to perform…
Read more
WF Central Situational Awareness

5 Ways Waterfall Central™ Improves Situational Awareness 

Want to learn more? Contact us
Read more
Connected OT to the Cloud with Waterfall and AWS

Securing Industrial Data Flow to AWS 

In conclusion, Waterfall Security offers a robust solution for securely streaming OT/IIoT data to AWS IoT SiteWise and…
Read more
Top 5 Podcast Episode - Happy Holidays

All Time Favorite Podcast Episodes: Andrew Ginter's Top Picks

 If you have time over the holidays and are looking for a podcast (or five) to make you…
Read more
How OT hackers are getting IN today

How Are OT Hackers Getting IN Today?

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more

The 2023 Threat Report – At a Glance

The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more
NIS2 Directive and Impact on OT Cybersecurity

NIS2 and Its Impact on Operational Technology Cybersecurity

The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more

9 Cybersecurity Challenges for Critical Water Infrastructure

In recent years, the issue of cybersecurity for vital water infrastructure has become a growing concern worldwide. Water…
Read more

Water Utility Hacking 101

Water is life! Water is probably the most important resource for maintaining society and order. It’s easy to…
Read more
Segmentation 202 Unidirectional Architectures

Segmentation 202: Unidirectional Architectures

This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more
OT Risk Management Getting Started and Assigning Risk

OT Risk Management: Getting Started and Assigning Risk

OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more

CISA ICSJWG Event - A Lot to Look Forward To

The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more
Industrial Connectivity without cyber risk

Adding Industrial Connectivity Without Adding Cyber Risk

As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the…
Read more
IT vs. OT Differences, Superficial vs. Fundamental

IT vs. OT Differences, Superficial vs. Fundamental

To learn more about consequence-driven designs for critical OT networks, click here to request a free copy of…
Read more
How to Properly Cyber Secure an Upstream Oil & Gas Operation

How to Properly Cyber Secure an Upstream Oil & Gas Operation

Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security…
Read more
OT Security Solutions

OT Security Solutions: Exploring Technologies

In conclusion, the significance of OT security solutions cannot be overstated in today's interconnected world. Waterfall Security Solutions…
Read more
Cyberproofing Oil and Gas Production

Keeping the Flow:  Cyber-Proofing Oil & Gas Production

An expanding desire for O&G companies is the ability to leverage their industrial data in order to perform…
Read more
WF Central Situational Awareness

5 Ways Waterfall Central™ Improves Situational Awareness 

Want to learn more? Contact us
Read more
Connected OT to the Cloud with Waterfall and AWS

Securing Industrial Data Flow to AWS 

In conclusion, Waterfall Security offers a robust solution for securely streaming OT/IIoT data to AWS IoT SiteWise and…
Read more
Top 5 Podcast Episode - Happy Holidays

All Time Favorite Podcast Episodes: Andrew Ginter's Top Picks

 If you have time over the holidays and are looking for a podcast (or five) to make you…
Read more
ebook on how to protect government networks from cyberthreats

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
Cybersecurity for the rail industry eBook

Cybersecurity for the rail industry eBook

The safety imperative in railConnectivity at the operations control centerManaging cybersecurity in vital networksUnidirectional gateways vs. FirewallsA reference…
Read more
NIS2 Compliance Guide for OT systems

NIS2 Compliance Guide for OT systems

Introduction to NIS2 DirectiveFrom NISD to NIS2. Why a new regulation?Best practices and controls for OT professionals to…
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
The New Era Of Cyber Insurance

The New Era of Cyber Insurance

Progress-in-Work A: Insurance CyberCatastrophes CyberDiligence DueRisks Cyber ReducingLearned Lessons
Read more
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididuntLorem ipsum dolor sit amet, consectetur…
Read more
Government Network Cybersecurity

Cybersecurity for Government Networks

Defending Critical LNG Import Terminals From Cyber Threats Customer: A Government Security Agency in Asia-Pacific Customer Requirement:…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

100% Secure: Customer's OT remains physically unbreachable to any remote threats.  Real-time Data Visibility: Customer now has full, real-time…
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity For LNG Ports

Cybersecurity for LNG Ports

Cybersecurity Is A Business Imperative For Lng Ports And Terminals
Read more
Unidirectional Protection For Railway Signaling Networks

Unidirectional Protection For Railway Signaling Networks

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the…
Read more
Enabling The Digital Refinery

Enabling The Digital Refinery

Refining & Petrochemicals Processing Modernization And Containing Remote Cyber Threats
Read more
Securing Pharmaceutical Manufacturing Systems And Intellectual Property

Securing Pharmaceutical Manufacturing Systems and Intellectual Property

Cyber Risks To Pharmaceutical Manufacturing
Read more

Protecting the GIPL pipeline

Cross border pipeline infrastructure is facing real cyber threats
Read more
Government Network Cybersecurity

Cybersecurity for Government Networks

Defending Critical LNG Import Terminals From Cyber Threats Customer: A Government Security Agency in Asia-Pacific Customer Requirement:…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

100% Secure: Customer's OT remains physically unbreachable to any remote threats.  Real-time Data Visibility: Customer now has full, real-time…
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity For LNG Ports

Cybersecurity for LNG Ports

Cybersecurity Is A Business Imperative For Lng Ports And Terminals
Read more
Unidirectional Protection For Railway Signaling Networks

Unidirectional Protection For Railway Signaling Networks

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the…
Read more
Enabling The Digital Refinery

Enabling The Digital Refinery

Refining & Petrochemicals Processing Modernization And Containing Remote Cyber Threats
Read more
Securing Pharmaceutical Manufacturing Systems And Intellectual Property

Securing Pharmaceutical Manufacturing Systems and Intellectual Property

Cyber Risks To Pharmaceutical Manufacturing
Read more

Protecting the GIPL pipeline

Cross border pipeline infrastructure is facing real cyber threats
Read more
ebook on how to protect government networks from cyberthreats

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
Cybersecurity for the rail industry eBook

Cybersecurity for the rail industry eBook

The safety imperative in railConnectivity at the operations control centerManaging cybersecurity in vital networksUnidirectional gateways vs. FirewallsA reference…
Read more
NIS2 Compliance Guide for OT systems

NIS2 Compliance Guide for OT systems

Introduction to NIS2 DirectiveFrom NISD to NIS2. Why a new regulation?Best practices and controls for OT professionals to…
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
The New Era Of Cyber Insurance

The New Era of Cyber Insurance

Progress-in-Work A: Insurance CyberCatastrophes CyberDiligence DueRisks Cyber ReducingLearned Lessons
Read more
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididuntLorem ipsum dolor sit amet, consectetur…
Read more
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.
Read more

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Ransomware Attack on Data Center Infrastructure (Infographic)

As data centers grow in importance, scale, and complexity, so do the security challenges they face. Among the…
Read more

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more

Oil and Gas Cyber Attacks

Our exclusive infographic explores the top 6 cyber attacks on oil & gas industries in the last decade.…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.
Read more

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Ransomware Attack on Data Center Infrastructure (Infographic)

As data centers grow in importance, scale, and complexity, so do the security challenges they face. Among the…
Read more

Oil and Gas Cyber Attacks

Our exclusive infographic explores the top 6 cyber attacks on oil & gas industries in the last decade.…
Read more
episode 121 Jorgen Hartig CEO of SecuriOT

What’s Next? A Decision Support Tool for Industrial Security | Episode 121

Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
Industrial Security Podcast Mario Prieto Sanles USB Firmware Attacks Episode 120

USB Firmware Attack | Episode 120

Mario Prieto Sanlés is a pre-sales engineer at AuthUSB, a Spain-based company that sells hardware and software tools…
Read more
ISP Chris Gorog episode 119

Managing Trust in Massive IIoT Systems | Episode 119

Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Making the Move into OT Security - Mike Holcomb - episode 118

Making the Move into OT Security | Episode 118

Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Aurelio Blanquet, Secretary General of EE-ISAC

Building Trust to Cooperate at the EE-ISAC | Episode 117

Transcript of this podcast episode #117: Building Trust to Cooperate - at the EE-ISACPlease note: This transcript was auto-generated and…
Read more
Industrial Security Podcast | Episode 116 - Aaron Turner

Failures of Imagination - from 9-11 to The Aurora Test | Episode 116

Aaron Turner...go down the path some like this How how often does it actually work and we really…
Read more
Podcast Episode 115 - Kyle Peters - Building Automation IEC 62443

Safety, Security and IEC 62443 in Building Automation | Episode 115

Transcript of this podcast episode #115: Safety, Security & IEC 62443Please note: This transcript was auto-generated and then edited by…
Read more
Podcast Episode 114 with Mike Almeyda

Physical Security Supports Cybersecurity | Episode 114

Transcript of this podcast episode #114: Physical Security Supports Cybersecurity with Mike Almeyda from Force 5 Please note: This transcript…
Read more

Risk in Context: When to Patch, When to Let It Ride | Episode 109

In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more
Hacking the Canbus, with Dr Ken Tindell

Hacking the CANbus | Episode 108

In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Saving Money and Effort Automating Compliance | Episode 107

In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

How Cyber Fits Into Big-Picture Risk | Episode 106

In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Six Steps to Integrating IT & OT in Mining | Episode 105

In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Jesus Molina on the Biden National Cyber Strategy

The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Cybersecurity Risk Assessment using IEC 62443 | Episode 104

Read more

Shining a Light into the Dark for Oil and Gas Cybersecurity | Episode #103

Getting an industrial site started on the cybersecurity road can be hard. In the Oil & Gas industry,…
Read more
episode 121 Jorgen Hartig CEO of SecuriOT

What’s Next? A Decision Support Tool for Industrial Security | Episode 121

Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
Industrial Security Podcast Mario Prieto Sanles USB Firmware Attacks Episode 120

USB Firmware Attack | Episode 120

Mario Prieto Sanlés is a pre-sales engineer at AuthUSB, a Spain-based company that sells hardware and software tools…
Read more
ISP Chris Gorog episode 119

Managing Trust in Massive IIoT Systems | Episode 119

Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Making the Move into OT Security - Mike Holcomb - episode 118

Making the Move into OT Security | Episode 118

Transcript of this podcast episode #118: Making the Move into OT Security | Episode 118Please note: This transcript was auto-generated…
Read more
Aurelio Blanquet, Secretary General of EE-ISAC

Building Trust to Cooperate at the EE-ISAC | Episode 117

Transcript of this podcast episode #117: Building Trust to Cooperate - at the EE-ISACPlease note: This transcript was auto-generated and…
Read more
Industrial Security Podcast | Episode 116 - Aaron Turner

Failures of Imagination - from 9-11 to The Aurora Test | Episode 116

Aaron Turner...go down the path some like this How how often does it actually work and we really…
Read more
Podcast Episode 115 - Kyle Peters - Building Automation IEC 62443

Safety, Security and IEC 62443 in Building Automation | Episode 115

Transcript of this podcast episode #115: Safety, Security & IEC 62443Please note: This transcript was auto-generated and then edited by…
Read more
Podcast Episode 114 with Mike Almeyda

Physical Security Supports Cybersecurity | Episode 114

Transcript of this podcast episode #114: Physical Security Supports Cybersecurity with Mike Almeyda from Force 5 Please note: This transcript…
Read more
NIS2 Recorded Webinar

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Top 10 Cyberattacks 2023 Webinar Recording

Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023

In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Andrew Ginter new book recorded webinar

Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide

Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Network Engineering Recorded Webinar

Network Engineering | Recorded Webinar

Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more

Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar

We covered a range of topics in the webinar, including: The steady evolution of OT cyber incidents with…
Read more

Engineering-Grade Cybersecurity for Water Utilities | Recorded Webinar

Rees Machtemes and Andrew Ginter guide us through the latest trends and recent incidents of the cyber threat environment…
Read more
1920-1080 rail Webinar recording

Rail System Cybersecurity | Recorded Webinar

Chris Crawford and Andrew Ginter walk us through the new TSA cybersecurity directives, while taking a look at…
Read more

Engineering-Grade Cybersecurity for Water Utilities | Recorded Webinar

Rees Machtemes and Andrew Ginter guide us through the latest trends and recent incidents of the cyber threat environment…
Read more
1920-1080 rail Webinar recording

Rail System Cybersecurity | Recorded Webinar

Chris Crawford and Andrew Ginter walk us through the new TSA cybersecurity directives, while taking a look at…
Read more

Rail Cybersecurity - New Solution for an Old Industry | Recorded Webinar

About the Recorded Webinar In this presentation, viewers will be introduced to Christopher Crawford, a renowned thought leader…
Read more

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

This webinar segment originally aired during the CS2AI Symposium: Industrial Security Road Trip blockbuster event. In it, Rees…
Read more

Waterfall Security at TOGC 2023 in Istanbul

WATCH: Naoufal Kerboute, Regional Sales Director – Middle East, Turkey & North Africa answers questions about Waterfall Security’s…
Read more

Evolving TSA Pipeline Security Directives | Recorded Webinar

Andrew Ginter explores the evolution of the TSA's directives for pipeline cybersecurity, as well as explaining their reasoning.https://www.youtube.com/watch?v=A2YXPNXU0AcFor…
Read more

Unidirectional Cloud Gateway for Rail | Waterfall & Alstom

Watch as Eddy Thésée, Vice President Cybersecurity at Alstom, and Lior Frenkel, CEO and Co-Founder at Waterfall, discuss…
Read more

Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek

Managing OT cyber risk is more than cybersecurity - an IT-SEC only approach ignores powerful engineering tools for…
Read more
NIS2 Recorded Webinar

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Top 10 Cyberattacks 2023 Webinar Recording

Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023

In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Andrew Ginter new book recorded webinar

Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide

Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Network Engineering Recorded Webinar

Network Engineering | Recorded Webinar

Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more

Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar

We covered a range of topics in the webinar, including: The steady evolution of OT cyber incidents with…
Read more
Oil & Gas Webinar

Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along…
Read more

Webinar: The NIS2 Directive: A Guide for OT Professionals

Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar: The Top 10 OT/ICS Cyberattacks of 2023

Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar: Engineering-Grade OT Security: A manager's guide

Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Oil & Gas Webinar

Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along…
Read more

Webinar: The NIS2 Directive: A Guide for OT Professionals

Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar: The Top 10 OT/ICS Cyberattacks of 2023

Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar: Engineering-Grade OT Security: A manager's guide

Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Protecting Data Center Infrastructure Blog Post

The Challenges of Safeguarding Data Center Infrastructure  

In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security.…
Read more
Industrial Connectivity without cyber risk

Adding Industrial Connectivity Without Adding Cyber Risk

Read more
Government Network Cybersecurity

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
ebook on how to protect government networks from cyberthreats

eBook: Unidirectional Security Gateways for Government Networks

The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies…
Read more
IT vs. OT Differences, Superficial vs. Fundamental

IT vs. OT Differences, Superficial vs. Fundamental

The fundamental difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyber…
Read more
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to…
Read more
How to Properly Cyber Secure an Upstream Oil & Gas Operation

How to Properly Cyber Secure an Upstream Oil & Gas Operation

The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such…
Read more
OT Security Solutions

OT Security Solutions: Exploring Technologies

The operational technology (OT) environments that power critical infrastructure face rapidly escalating cyber threats. As facilities like power…
Read more

Engineering-grade OT Security - A Manager's Guide

Waterfall is pleased to make free copies of the book available to qualified practitioners when the book releases.…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Trending posts

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Consult with a unidirectional
solutions architect