Securing Data Center OT Networks
What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?
In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security. However, this convergence of OT and ICS with traditional IT systems also introduces potential vulnerabilities that malicious actors can exploit.
BSEE has issued the Well Control Final Rule to consolidate existing well control rules into a revised regulation that addresses Blow Out Preventer (BOP) system design, performance and reliability.
Active defense or “intrusion prevention” deep into industrial networks has long been thought of as not workable. Youssef Jad – CTO at CyVault – joins us to talk about a new approach to OT active defense that is designed for sensitive OT / industrial environments.
In this webinar, Andrew Ginter, Rees Machtemes, and Greg Hale discuss recent attacks, trends, and lessons from the 2023 Waterfall/ICSStrive Threat Report, which included 57 cyber attacks that had real-world physical consequences.
It’s better to have logs and not need them, than to need logs and not have them. And the same applies to dual-logs. With dual-logs, cyber attackers are putting themselves in danger and revealing their intentions every time they wipe their events from the log.