
Webinar: 13 Ways To Break “Secure” OT Remote Access Systems
Explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable and which are most deserving of the “secure” title
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable and which are most deserving of the “secure” title

This webinar covers the record-breaking costs of consequences, what is behind the drop in ransomware attacks and the key defensive developments of 2025, in light of these threats

This webinar covers the record-breaking costs of consequences, what is behind the drop in ransomware attacks and the key defensive developments of 2025, in light of these threats

New guidance from the UK NCSC, co-signed by CISA, BSI, Australia’s ACSC and others, introduces significant updates for securing critical infrastructure

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the same organization, support the same mission, and even address many of the same threats, but when they sit down together it sounds like they need relationship counseling.

One EU nation after another is releasing new regulations for their energy infrastructures to comply with the NIS2 directive. Jørgen Hartig of SecuriOT in Denmark joins us to look at the recent Danish, Norwegian, Finnish and other rules.

Learn how secure access can enhance both safety and performance in renewable energy operations.

What’s driving the sudden surge in OT capable malware? Who’s behind these threats and how should our defenses evolve to keep pace?