
IT/OT Cyber Theory: Espionage vs. Sabotage
The second-generation of OT security advice started to emerge in 2012-2016.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

The second-generation of OT security advice started to emerge in 2012-2016.

“Everyone” has heard of the 5-week shutdown of Jaguar Land Rover by a cyber attack. That attack is the obvious headline for Waterfall’s up-coming webinar “Top 10 OT Cyber Attacks of 2025” that I’m currently researching.

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a lot of good work, with one or two exceptions.

Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations.

Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure.

How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges.

How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices

Discover the key differences between unidirectional and bidirectional integration to choose the best approach for secure and efficient system connectivity.

This guide will walk you through everything you need to know about industrial control system software—from its fundamental components and core functionalities to the latest trends shaping its future.