Category: OT security standards

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims – in this article we look at cloud-rendezvous style remote access systems for OT networks and how they work. We debunk the most outrageous claims, we look at residual risk that we accept when deploying these systems, and we suggest circumstances where deploying these kinds of systems actually does make sense.

Read More »