
What is OT Cybersecurity?
Learn what OT cybersecurity is, how it protects critical infrastructure, and the key threats, strategies, and standards you need to know.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Learn what OT cybersecurity is, how it protects critical infrastructure, and the key threats, strategies, and standards you need to know.
The standard answer to this questions is “The Consequence Boundary”…but which kind of consequences are we talking about? And aren’t there different levels of consequence? We help define these to answer the question.
Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.
Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.
How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud.
For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.
Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats.
Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations.
Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more.
What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?