
Securing OPC DA With Unidirectional Gateways
When it comes to securing OPC DA, nothing compares to the security that a unidirectional gateway provides.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
When it comes to securing OPC DA, nothing compares to the security that a unidirectional gateway provides.
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes
How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we’re in.
Cyber attacks impacting physical operations, like shut-downs, are rising. Waterfall’s NEW annual threat report provides industrial operators with the latest trends in the threat environment to prepare themselves going forward.
Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.
Precision farming is heavily automated, as are the “food factories” essential to feeding the world’s population. Marcus Sachs at the McCrary Institute at Auburn University joins us to look at the threats, the challenges and opportunities to secure our food supplies from cyber risk.
Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in 2023 that are in public records.
Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.