
IT/OT Cyber Theory: Espionage vs. Sabotage
The second-generation of OT security advice started to emerge in 2012-2016.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

The second-generation of OT security advice started to emerge in 2012-2016.

“Everyone” has heard of the 5-week shutdown of Jaguar Land Rover by a cyber attack. That attack is the obvious headline for Waterfall’s up-coming webinar “Top 10 OT Cyber Attacks of 2025” that I’m currently researching.

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a lot of good work, with one or two exceptions.

Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations.

Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure.