Waterfall logo white

All

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].

  • All
  • Blog
  • Case studies
  • eBook
  • Infographic
  • Podcast
  • Video
  • Webinar

"We Need Smarter Ways of Building Data Centers" | Eps.111

Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111
Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111

"We Need Smarter Ways of Building Data Centers" | Eps.111

Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade solutions…
Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more
Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security

Engineering Grade Protection for Data Center OT System

Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data…
Read more
Waterfall Security Brand Refreshes

Waterfall Security Refreshes and Rejuvenates Cybersecurity Brand  

As Waterfall's product lineup and market footprint have continued to evolve over the years, a brand refresh became…
Read more
Securing Data Center OT Networks

Securing Data Center OT Networks 

What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities,…
Read more
Protecting Data Center Infrastructure Blog Post

The Challenges of Safeguarding Data Center Infrastructure  

In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security.…
Read more
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE has issued the Well Control Final Rule to consolidate existing well control rules into a revised regulation…
Read more

Engineering-grade Ot Security - A Manager's Guide

New Book Release Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled…
Read more

Engineering Grade Protection for Data Center OT System

Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security
Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security

Engineering Grade Protection for Data Center OT System

Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data…
Read more
Waterfall Security Brand Refreshes

Waterfall Security Refreshes and Rejuvenates Cybersecurity Brand  

As Waterfall's product lineup and market footprint have continued to evolve over the years, a brand refresh became…
Read more
Securing Data Center OT Networks

Securing Data Center OT Networks 

What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities,…
Read more
Protecting Data Center Infrastructure Blog Post

The Challenges of Safeguarding Data Center Infrastructure  

In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security.…
Read more
How OT hackers are getting IN today

How Are OT Hackers Getting IN Today?

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more

Waterfall Security Establishes European Headquarters

New Netherlands office will provide further local support for EU markets  Rosh Ha’Ayin, Israel – July 4, 2023…
Read more

The 2023 Threat Report – At a Glance

The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more

NIS2 and Its Impact on Operational Technology Cybersecurity

The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more

Segmentation 202: Unidirectional Architectures

This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more

How Are OT Hackers Getting IN Today?

How OT hackers are getting IN today
How OT hackers are getting IN today

How Are OT Hackers Getting IN Today?

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more

Waterfall Security Establishes European Headquarters

New Netherlands office will provide further local support for EU markets  Rosh Ha’Ayin, Israel – July 4, 2023…
Read more

The 2023 Threat Report – At a Glance

The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more

NIS2 and Its Impact on Operational Technology Cybersecurity

The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more

Segmentation 202: Unidirectional Architectures

This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more

Atlantic Data Security and Waterfall Security To Secure Manufacturing and Critical Infrastructures

New partnership provides proactive protection for important industries Rosh Ha’Ayin, Israel – May 9, 2023 – Waterfall Security…
Read more

OT Risk Management: Getting Started and Assigning Risk

OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more

CISA ICSJWG Event - A Lot to Look Forward To

The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more

Air Gaps – I do not think it means what you think it means

Air gaps are confusing – a significant minority of practitioners use the term “air gap” in a way…
Read more

Engineering Grade Protection for Data Center OT System

Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security
Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security

Engineering Grade Protection for Data Center OT System

Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data…
Read more
Waterfall Security Brand Refreshes

Waterfall Security Refreshes and Rejuvenates Cybersecurity Brand  

As Waterfall's product lineup and market footprint have continued to evolve over the years, a brand refresh became…
Read more
Securing Data Center OT Networks

Securing Data Center OT Networks 

What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities,…
Read more
Protecting Data Center Infrastructure Blog Post

The Challenges of Safeguarding Data Center Infrastructure  

In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security.…
Read more

Cybersecurity In Mining

Cybersecurity In Mining
Cybersecurity In Mining

Cybersecurity In Mining

Protecting Mining Operations From Evolving Cyber Threats Customer/ Partner: Australian-based surface and underground metals mine. Customer Requirement: Enable…
Read more

Cybersecurity In Mining

Cybersecurity In Mining
Cybersecurity In Mining

Cybersecurity In Mining

Protecting Mining Operations From Evolving Cyber Threats Customer/ Partner: Australian-based surface and underground metals mine. Customer Requirement: Enable…
Read more

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE has issued the Well Control Final Rule to consolidate existing well control rules into a revised regulation…
Read more

Engineering-grade Ot Security - A Manager's Guide

New Book Release Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled…
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

In the past year (2022), we saw 57 OT-related cyberattacks on industrial systems which caused physical consequences in…
Read more
OT Security Incidents In 2021

OT Security Incidents In 2021

In 2021, of 64 incidents reported in discrete manufacturing and process industries, 22 were cyber attacks with physical…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Firewalls are used extensively inside industrial networks and throughout enterprise networks, but best practice demands at least one…
Read more

eBook: Firewalls vs Unidirectional Gateways

Industrial & OT Security Insights Firewalls vs Unidirectional Gateways at IT/OT Interfaces GET THE EBOOK NOW Industrial /…
Read more

eBook: Targeted Ransomware: New Defenses For Manufacturing

New eBook by Waterfall Targeted Ransomware: New Defenses For Manufacturing GET THE EBOOK NOW Targeted ransomware is the…
Read more
Cybersecurity for AVEVA PI Servers

Cybersecurity for AVEVA PI Servers

AVEVA PI Systems are at the focus of IT/OT integration designs making this technology vital to IT/OT cybersecurity…
Read more

eBook: Cybersecurity for PI Servers: Simple, powerful, unidirectional protection at the IT/OT interface

New eBook by Waterfall Cybersecurity for PI Servers The problem with DMZs and the unidirectional alternative GET THE…
Read more

eBook: Firewalls vs Unidirectional Gateways

eBook: Firewalls vs Unidirectional Gateways

Industrial & OT Security Insights Firewalls vs Unidirectional Gateways at IT/OT Interfaces GET THE EBOOK NOW Industrial /…
Read more

eBook: Targeted Ransomware: New Defenses For Manufacturing

New eBook by Waterfall Targeted Ransomware: New Defenses For Manufacturing GET THE EBOOK NOW Targeted ransomware is the…
Read more

eBook: Cybersecurity for PI Servers: Simple, powerful, unidirectional protection at the IT/OT interface

New eBook by Waterfall Cybersecurity for PI Servers The problem with DMZs and the unidirectional alternative GET THE…
Read more

eBook: ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020

New eBook by Waterfall ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 GET THE EBOOK…
Read more

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE has issued the Well Control Final Rule to consolidate existing well control rules into a revised regulation…
Read more

Engineering-grade Ot Security - A Manager's Guide

New Book Release Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled…
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

In the past year (2022), we saw 57 OT-related cyberattacks on industrial systems which caused physical consequences in…
Read more
OT Security Incidents In 2021

OT Security Incidents In 2021

In 2021, of 64 incidents reported in discrete manufacturing and process industries, 22 were cyber attacks with physical…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Firewalls are used extensively inside industrial networks and throughout enterprise networks, but best practice demands at least one…
Read more
Cybersecurity for AVEVA PI Servers

Cybersecurity for AVEVA PI Servers

AVEVA PI Systems are at the focus of IT/OT integration designs making this technology vital to IT/OT cybersecurity…
Read more
ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

Targeted ransomware was responsible for all OT/industrial shutdowns in 2020. Add to this the SolarWinds supply chain breach…
Read more
Safe OT Network Intrusion Detection eBook

Safe OT Network Intrusion Detection eBook

Operational Technology Intrusion Detection Systems (OT IDS) add value by raising alerts for suspicious patterns of network traffic,…
Read more
Robust OT Security with Disciplined Control eBook

Robust OT Security with Disciplined Control eBook

Waterfall’s unidirectional gateway technology provides safe IT/OT Integration and the strongest protection from remote attacks enabling: – Real-Time…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more

"We Need Smarter Ways of Building Data Centers" | Eps.111

Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111
Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111

"We Need Smarter Ways of Building Data Centers" | Eps.111

Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center…
Read more
Youssef Jad Podcast 110

Active Defense in OT – How to Make it Work | Episode 110

Active defense or "intrusion prevention" deep into industrial networks has long been thought of as not workable. Youssef…
Read more

Risk in Context: When to Patch, When to Let It Ride | Episode 109

In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more
Hacking the Canbus, with Dr Ken Tindell

Hacking the CANbus | Episode 108

In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Saving Money and Effort Automating Compliance | Episode 107

In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

How Cyber Fits Into Big-Picture Risk | Episode 106

In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Six Steps to Integrating IT & OT in Mining | Episode 105

In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Jesus Molina on the Biden National Cyber Strategy

The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102

Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Risk in Context: When to Patch, When to Let It Ride | Episode 109

Risk in Context: When to Patch, When to Let It Ride | Episode 109

In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more
Hacking the Canbus, with Dr Ken Tindell

Hacking the CANbus | Episode 108

In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Saving Money and Effort Automating Compliance | Episode 107

In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

How Cyber Fits Into Big-Picture Risk | Episode 106

In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Six Steps to Integrating IT & OT in Mining | Episode 105

In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Jesus Molina on the Biden National Cyber Strategy

The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102

Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Bridging industrial Cybersecurity Workforce Gaps | Episode #101

Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more

Engineering-Grade security in the US DOE Cyber Informed Engineering Strategy | Episode #100

Cyber Informed Engineering – the new US DOE Strategy includes unhackable safeties, manual operations, and other engineering-grade protections,…
Read more

"We Need Smarter Ways of Building Data Centers" | Eps.111

Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111
Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111

"We Need Smarter Ways of Building Data Centers" | Eps.111

Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center…
Read more
Youssef Jad Podcast 110

Active Defense in OT – How to Make it Work | Episode 110

Active defense or "intrusion prevention" deep into industrial networks has long been thought of as not workable. Youssef…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar

In this webinar, Andrew Ginter, Rees Machtemes, and Greg Hale discuss recent attacks, trends, and lessons from the…
Read more

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

This webinar segment originally aired during the CS2AI Symposium: Industrial Security Road Trip blockbuster event. In it, Rees…
Read more

Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek

Managing OT cyber risk is more than cybersecurity – an IT-SEC only approach ignores powerful engineering tools for…
Read more

12 Months of Cyber Attacks—Lessons, Trends, and Predictions | Automation.com Recorded Webinar

Industrial cyber attacks leading to production downtime and other physical consequences more than doubled in 2021 over 2020.…
Read more

Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE – GISEC. Naoufal Kerboute,…
Read more

Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE – GISEC. Andrew Ginter,…
Read more

Redefining OT security with Unidirectional Security Gateways

Watch highlights from an interview by Ran Pedhazur, Chief Business Development Officer at Waterfall, and Nicolai Solling, Chief…
Read more
Bakotech Webinar Recording Firewalls vs. Unidirectional Security Gateways

Bakotech Webinar Recording: Firewalls vs. Unidirectional Security Gateways

eBook | Firewalls vs. Unidirectional Gateways
Read more

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

This webinar segment originally aired during the CS2AI Symposium: Industrial Security Road Trip blockbuster event. In it, Rees…
Read more

Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek

Managing OT cyber risk is more than cybersecurity – an IT-SEC only approach ignores powerful engineering tools for…
Read more

12 Months of Cyber Attacks—Lessons, Trends, and Predictions | Automation.com Recorded Webinar

Industrial cyber attacks leading to production downtime and other physical consequences more than doubled in 2021 over 2020.…
Read more

Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE – GISEC. Naoufal Kerboute,…
Read more

Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE – GISEC. Andrew Ginter,…
Read more

Redefining OT security with Unidirectional Security Gateways

Watch highlights from an interview by Ran Pedhazur, Chief Business Development Officer at Waterfall, and Nicolai Solling, Chief…
Read more
Bakotech Webinar Recording Firewalls vs. Unidirectional Security Gateways

Bakotech Webinar Recording: Firewalls vs. Unidirectional Security Gateways

eBook | Firewalls vs. Unidirectional Gateways
Read more

How to Protect Critical Infrastructure from Cyberattacks

SUBSCRIBE NEXT EPS. PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE NEXT EPS. Free consultation with Unidirectional solutions architect CONTACT US…
Read more

Rise of Ransomware 2022 | Industrial Security Institute

SUBSCRIBE INFOGRAPHIC PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE INFOGRAPHIC Free consultation with Unidirectional solutions architect CONTACT US The Top…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Cyber Attacks with Physical Consequences 2023 Threat Report | Recorded Webinar

In this webinar, Andrew Ginter, Rees Machtemes, and Greg Hale discuss recent attacks, trends, and lessons from the…
Read more

Network Engineering Webinar

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade solutions…
Read more

Network Engineering Webinar

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade solutions…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox