Upcoming Webinar: Navigating OT Remote Access – Technologies and Limitations, October 30
Days
Hours
Minutes
Seconds
Register Now

OT Insights Center

Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.

Search
Blog

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims - in this article we look at cloud-rendezvous style remote access systems for OT networks and how they work. We debunk the most outrageous claims, we look at residual risk that we accept when deploying these systems, and we suggest circumstances where deploying these kinds of systems actually does make sense....
Webinar

Webinar: Navigating OT Remote Access – Technologies, Limitations, and the Latest Recommendations

Join us for an insightful webinar as we delve into the rapidly evolving landscape of OT remote access. With the surge in remote access to OT networks, industrial operations and critical infrastructures are under pressure to enhance their security measures....
Books and eBooks

eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards

Blog

The 2024 Threat Report: Prioritizing Cyber Security Spending

Waterfall’s latest 2024 Threat Report document credible attacks with physical consequences on industrial and critical infrastructures. Credible attacks not only inform defensive designs, but also help prioritize new investments in OT security....
Blog

How Likely Is That To Kill Anyone?

IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”...
Podcast

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Compromise a cloud service and tens thousands of vehicles can be affected all at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."...

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Blog

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims - in this article we look at cloud-rendezvous style remote access systems for OT networks and how they work. We debunk the most outrageous claims, we look at residual risk that we accept when deploying these systems, and we suggest circumstances where deploying these kinds of systems actually does make sense....
Blog

The 2024 Threat Report: Prioritizing Cyber Security Spending

Waterfall’s latest 2024 Threat Report document credible attacks with physical consequences on industrial and critical infrastructures. Credible attacks not only inform defensive designs, but also help prioritize new investments in OT security....
Blog

How Likely Is That To Kill Anyone?

IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”...
Blog

The Singapore OT Cybersecurity Masterplan

Singapore has set in motion its vision for protecting critical national infrastructure and OT networks with its newly released 2024 OT Cybersecurity Masterplan....
Blog

IT Remote Access VS. OT Remote Access

Outline comparing key differences between remote access used in an IT environment, and remote access solutions that cater to an industrial OT environment...
Blog

The Art of AI-Generated OT Payloads: From Mischief to Existential Threat

Almost 10 years ago, I managed to take control of every appliance in a 200-room hotel. I could raise the blinds in each room, change the TV channels, adjust the outside lighting, modify the temperature settings, and more. I had complete control. In the years since, to my surprise, the number one question I was asked wasn't "How did you do it?" but rather "With the control you had, what's the worst thing you could have done?"...

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Books and eBooks

eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards

Books and eBooks

BMS Use-Case eBook: Impenetrable Cyber Defense for Data Center Infrastructure

This eBook explores the best-practices for protecting the BMS (Building Management System) from internet-based cyberattacks and similar threats. Get your copy today...
Books and eBooks

2024 Threat Report – OT Cyberattacks with Physical Consequences

Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in 2023 that are in public records....
Books and eBooks

eBook: Unidirectional Security Gateways for Government Networks

The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies need to increase automation and network connectivity to maintain strategic military, governance, and economic advantages....
Books and eBooks

Engineering-grade OT Security – A Manager’s Guide

Waterfall is pleased to make free copies of the book available to qualified practitioners when the book releases. Request your copy now...
Books and eBooks

Cybersecurity for the rail industry eBook

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Case studies

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks....
Case studies

UAE Based Oil & Gas Refinery 

How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud....
Case studies

Securing a European TSO

Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats....
Case studies

Cybersecurity for LNG Ports

Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations....
Case studies

Unidirectional Protection For Railway Signaling Networks

Enabling 100% secure remote monitoring of rail signaling and control networks, enabling SOC and corporate IT systems with secure visibility into signaling networks....
Case studies

Enabling The Digital Refinery

Protecting critical equipment of a highly sensitive petrochemicals processing plant, while improving production performance with real-time, actionable, and predictive analytics....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Infographic

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations. Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations....
Infographic

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted industrial operations, specifically Operational Technology (OT) and Industrial Controls Systems (ICS) that are commonly used within critical and important infrastructure....
Infographic

Ransomware Attack on Data Center Infrastructure (Infographic)

Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks....
Infographic

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

Infographic

Oil and Gas Cyber Attacks

What cyber crime threats to oil & gas infrastructures are top of mind for government and business leaders?...
Infographic

Cyber Attacks On Critical Infrastructure

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Podcast

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Compromise a cloud service and tens thousands of vehicles can be affected all at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."...
Podcast

AI Takes on Polymorphic Malware | Episode 130

Gary Southwell of Aria Cyber joins us on The Industrial Security Podcast as we have a look at using AI to get ahead of constantly-changing malware....
Podcast

New Resource: Adapting IT Advice for OT | Episode 129

Jack Bliss of 1898 & Co. has adapted the CIS Top-18 list for OT/industrial, adding a lot of industrial context and lists of related OT-centric tools and technology....
Podcast

Their Own Rail System, Water Treatment, and More | Episode 128

Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an airport and how are thousands of airports changing their cybersecurity because of NIS2 and the regulatory environment.​...
Podcast

Rapid Recovery After an Attack | Episode 127

Ransomware is the most common cyber attack causing OT outages - all Windows machines encrypted. What if we could "press a button" and have everything working again in seconds or minutes? Alex Yevtushenko of Salvador Technologies joins us to look at new technology for rapid recovery....
Podcast

CWE for Zero Days – not CVE | Episode 126

The Mitre CWE - Common Weakness Enumeration is database talks about kinds of problems that can show up in the future - future zero days - rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners and operators use it....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Video

Webinar: Industry-Specific 62443 Insights for Power Generation

An in-depth webinar that goes beyond the buzzwords and provides practical, industry-specific guidance on applying the ISA/IEC 62443 standards to safeguard critical power infrastructure...
Video

Webinar: HERA – Hardware-Enforced Remote Access

Recorded webinar as we took a look at solutions enforced by dedicated hardware, and what benefits such solutions offer for OT security....
Video

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water Utilities face and how to counter against them....
Video

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Cyber-Informed Engineering (CIE) offers a new engineering-friendly approach to understanding and addressing cyber threats that have the potential to impair worker safety and damage long-lead-time equipment in Mining & Metals operations....
Video

Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report

Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report....
Video

Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers

Data from the past year shows a continual increase in cyber attacks shutting down or even damaging manufacturing operations. The new Cyber-Informed Engineering (CIE) initiative provides a new perspective on addressing the problem, especially for the most consequential safety-critical and quality-critical manufacturing operations and systems....

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Consult with a unidirectional
solutions architect