How to Properly Cyber Secure an Upstream Oil & Gas Operation
The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such as oil fields and offshore platforms.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such as oil fields and offshore platforms.
The operational technology (OT) environments that power critical infrastructure face rapidly escalating cyber threats. As facilities like power plants, water treatment centers, and manufacturing plants connect operations to external networks, they expose vulnerable legacy OT systems. Attacks like TRITON, Stuxnet, and Industroyer demonstrate the damage hackers can inflict when they access operational networks. To protect themselves, organizations need OT security solutions exploring for industrial control systems.
IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over.
Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.
Introducing Waterfall Central: Come for simple remote monitoring of multiple devices, stay for operational awareness.
How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud.
Waterfall is proud to be recognized by Amazon as a validated industry standard for connecting OT systems to the AWS Cloud.
Andrew Ginter shares with us his top 5 favorite podcast episodes from the Industrial Security Podcast that he co-hosts
For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.
Managing OT Cyber risk takes on different approaches and expertise depending on the potential consequences of compromise to a particular system. This is why it is important to delve into the distinction and importance of an engineering-centric approach to managing OT cyber risk.