Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Tim McCreight of TaleCraft Security in his (coming soon) book “I don’t sign s**t” uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions – with often surprising results when we do.
Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations.
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kieffer, attorney at reuschlaw, walks us through what’s new and what it means for vendors, as well as for owner / operators.
Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure.
How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges.
How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities “all over the place” network-wise and security-wise? What most of us need is “network duct tape”. Tom Sego of Blastwave shows us how their “duct tape” works.
Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms.
Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed.