Content Category: Blog

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].

Water Industry Cyber Threat Landscape
OT cybersecurity insights center

Water Industry Cyber Threat Landscape

Running water and working indoor plumbing are a basic necessity for modern cities. Most of us take for granted that the tap gives us water and that the water goes down the drain when we are done with it without giving it much thought.

Read More »
40 years of cyber targets
OT cybersecurity insights center

40 Years Deploying Cyber Targets

For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.

Read More »
What is OT anyway?
OT cybersecurity insights center

What is OT Anyway?

Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes

Read More »
2024 threat report at a glance
OT cybersecurity insights center

The 2024 Threat Report – At a Glance

Cyber attacks impacting physical operations, like shut-downs, are rising. Waterfall’s NEW annual threat report provides industrial operators with the latest trends in the threat environment to prepare themselves going forward.

Read More »
Can Government Save OT Security
Government and Defense

OT Cybersecurity: Can the Government Save Us?

Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.

Read More »
are we still trying to protect industrial information
OT cybersecurity insights center

OT Security: Are We Protecting the Information?

Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.

Read More »