Content Category: Blog without auto template

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].

Step 2 - Addressing Cyber Risk
OT cybersecurity insights center

Step 2 Addressing OT Cyber Risk: Asset Inventory & Dependencies

Managing OT Cyber risk takes on different approaches and expertise depending on the potential consequences of compromise to a particular system. This is why it is important to delve into the distinction and importance of an engineering-centric approach to managing OT cyber risk.

Read More »
NIS2 compliance cheat sheet
OT cybersecurity insights center

NIS2 Compliance for ICS

The NIS2 Directive is a directive by the European Parliament on the measures that need to be taken for a high common level of cybersecurity across the European Union.

Read More »
Engineering Grade Protection for Data Center OT Systems by Andrew Ginter, VP Industrial Security
Facilities

Engineering Grade Protection for Data Center OT Systems

Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more.

Read More »
Securing Data Center OT Networks
Facilities

Securing Data Center OT Networks 

What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?

Read More »
Protecting Data Center Infrastructure Blog Post
Facilities

The Challenges of Safeguarding Data Center Infrastructure  

In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security. However, this convergence of OT and ICS with traditional IT systems also introduces potential vulnerabilities that malicious actors can exploit.

Read More »
The Curious Case of Dual Event Logs
OT security standards

The Curious Case of Dual Event Logs

It’s better to have logs and not need them, than to need logs and not have them. And the same applies to dual-logs. With dual-logs, cyber attackers are putting themselves in danger and revealing their intentions every time they wipe their events from the log.

Read More »