
Data Diodes vs. Unidirectional Gateways
Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them.
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments.
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role.
Looking for Security Funding for Capital Budgets? Ian Fleming of Deloitte explains how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.
One of the most significant vulnerabilities when it comes to OT security for critical infrastructure are the risks posed by the use of remote access into OT.
Watch the webinar on some of the biggest OT cyberthreats, and risks, that businesses face today.
The standard answer to this questions is “The Consequence Boundary”…but which kind of consequences are we talking about? And aren’t there different levels of consequence? We help define these to answer the question.
Nation state threats are often portrayed as the “irresistible forces” of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper – what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?
Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new “data science” alternative.