Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it
Days
Hours
Minutes
Seconds
Register Now

Category: OT security standards

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims – in this article we look at cloud-rendezvous style remote access systems for OT networks and how they work. We debunk the most outrageous claims, we look at residual risk that we accept when deploying these systems, and we suggest circumstances where deploying these kinds of systems actually does make sense.

Read More »
OT Security blog post about how likely a security flaw might end up unaliving someone

How Likely Is That To Kill Anyone?

IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”

Read More »
AI Generated OT Payloads - Jesus Molina Blog

The Art of AI-Generated OT Payloads: From Mischief to Existential Threat

Almost 10 years ago, I managed to take control of every appliance in a 200-room hotel. I could raise the blinds in each room, change the TV channels, adjust the outside lighting, modify the temperature settings, and more. I had complete control. In the years since, to my surprise, the number one question I was asked wasn’t “How did you do it?” but rather “With the control you had, what’s the worst thing you could have done?”

Read More »