Author: Andrew Ginter

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Level Zero

Finally, An OT Security Approach That Works

OT security is evolving with the “Level Zero” approach, which combines cybersecurity and engineering to prevent physical and cyber threats. This holistic strategy is a game-changer for safeguarding critical infrastructure and marks the next major step in OT security. Join the inaugural Level Zero conference to be part of this groundbreaking shift.

Read More »
Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims – in this article we look at cloud-rendezvous style remote access systems for OT networks and how they work. We debunk the most outrageous claims, we look at residual risk that we accept when deploying these systems, and we suggest circumstances where deploying these kinds of systems actually does make sense.

Read More »
OT Security blog post about how likely a security flaw might end up unaliving someone

How Likely Is That To Kill Anyone?

IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”

Read More »