OT Insights Center

Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.

Search
Blog

Hardware-Enforced Remote Access (HERA) – Under the Hood

Blog

Remote Access Vulnerabilities and a Hardware-Enforced Solution

Remote access for OT is vital for maintaining efficiencies, troubleshooting, and is also important for retaining remote workers.
Webinar

Webinar: HERA – Hardware-Enforced Remote Access

Join our webinar on July 31, 2024 at 11:00 AM New York Time as we look at solutions
Podcast

Their Own Rail System, Water Treatment, and More | Episode 128

Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an
Blog

Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis

It turns out that there are really only three ways that ransomware can shut down OT networks and
Blog

The 2024 Threat Report: Findings and Takeaways For Manufacturers

Manufacturing, vital yet risky, faces a growing threat: criminal ransomware. Waterfall Security Solutions' 2024 Threat Report reveals a

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Blog

Hardware-Enforced Remote Access (HERA) – Under the Hood

Blog

Remote Access Vulnerabilities and a Hardware-Enforced Solution

Remote access for OT is vital for maintaining efficiencies, troubleshooting, and is also important for retaining remote workers.
Blog

Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis

It turns out that there are really only three ways that ransomware can shut down OT networks and
Blog

The 2024 Threat Report: Findings and Takeaways For Manufacturers

Manufacturing, vital yet risky, faces a growing threat: criminal ransomware. Waterfall Security Solutions' 2024 Threat Report reveals a
Blog

Water Industry Cyber Threat Landscape

Running water and working indoor plumbing are a basic necessity for modern cities. Most of us take for
Blog

40 Years Deploying Cyber Targets

For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Books and eBooks

2024 Threat Report – OT Cyberattacks with Physical Consequences

Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in
Books and eBooks

eBook: Unidirectional Security Gateways for Government Networks

The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies
Books and eBooks

Engineering-grade OT Security – A Manager’s Guide

Waterfall is pleased to make free copies of the book available to qualified practitioners when the book releases.
Books and eBooks

Cybersecurity for the rail industry eBook

Books and eBooks

NIS2 Compliance Guide for OT systems

Books and eBooks

2023 Threat Report – OT Cyberattacks With Physical Consequences

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Case studies

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing
Case studies

UAE Based Oil & Gas Refinery 

How a UAE-based refinery was able to protect their legacy system to the extent it could safely be
Case studies

Securing a European TSO

Case studies

Cybersecurity for LNG Ports

Case studies

Unidirectional Protection For Railway Signaling Networks

Case studies

Enabling The Digital Refinery

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Infographic

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to
Infographic

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted
Infographic

Ransomware Attack on Data Center Infrastructure (Infographic)

Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks.
Infographic

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

Infographic

Oil and Gas Cyber Attacks

What cyber crime threats to oil & gas infrastructures are top of mind for government and business leaders?
Infographic

Cyber Attacks On Critical Infrastructure

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Podcast

Their Own Rail System, Water Treatment, and More | Episode 128

Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an
Podcast

Rapid Recovery After an Attack | Episode 127

Ransomware is the most common cyber attack causing OT outages - all Windows machines encrypted. What if we
Podcast

CWE for Zero Days – not CVE | Episode 126

The Mitre CWE - Common Weakness Enumeration is database talks about kinds of problems that can show up
Podcast

AI and Industrial Security in the Energy Transition | Episode 125

Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to
Podcast

Evaluating Network Segmentation Strength | Episode 124

How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception
Podcast

Tractors to Table Tops – Industrial Security in the Industry of Human Consumables | Episode 123

Precision farming is heavily automated, as are the "food factories" essential to feeding the world's population. Marcus Sachs

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Video

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water
Video

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Cyber-Informed Engineering (CIE) offers a new engineering-friendly approach to understanding and addressing cyber threats that have the potential
Video

Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report

Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Video

Recorded Webinar: Engineering-Grade Mitigations For Cyber Attacks Targeting Manufacturers

Data from the past year shows a continual increase in cyber attacks shutting down or even damaging manufacturing
Video

Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long
Video

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it's timeline, what it

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Consult with a unidirectional
solutions architect