OT Insights Center
Welcome to OT Insights Center
We have compiled a collection of useful information, tools, and resources to help you find the information you are looking for.
Upcoming webinars
Bringing Engineering on Board and Resetting IT Expectations
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the same organization, support the same mission, and even address many of the same threats, but when they sit down together it sounds like they need relationship counseling. Much has been written about the problem. Most of that writing misses the point, focusing on symptoms, not root causes. In this webinar we dig into causes, solutions and how to ask the right questions to guide the relationship into healthy cooperation....
Podcast
We can’t – and shouldn’t – fix everything – Episode 147
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance....
Podcast
Medical Device Cybersecurity Is Tricky – Episode 146
Yes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers....
Podcast
Hardware Hacking – Essential OT Attack Knowledge – Episode 145
If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems....
Blog
Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies
Trending posts
Top Oil and Gas Security Challenges and Best Practices for Protection
November 11, 2025
Security by Design- The New Imperative for Rail Systems
November 4, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Blog
Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies
Blog
Cybersecurity Risk Assessment for Public Transport OT Environments: A Practical Guide
Blog
Secure Industrial Remote Access Solutions
Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations....
Trending posts
Managing Risk with Digital Twins – What Do We Do Next? – Episode 144
October 20, 2025
IT & OT Relationship Management
October 20, 2025
Analyzing Recent NIS2 Regulations – OT security is changing
October 5, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Books and eBooks
IT & OT Relationship Management
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about the problem. Most of that writing misses the point. In most cases, the relationship problem can be resolved with a little clarity, a bit more good will, and a modicum of mutual education....
Books and eBooks
Rethinking Secure Remote Access for Industrial and OT Networks
Discover which remote access technologies truly secure industrial and OT networks—and which leave critical operations exposed....
Books and eBooks
13 Ways to Break a Firewall
How much protection do firewalls really offer? Get the book to explore 13+ real-world attack scenarios that defeat firewalls and better designs for protecting industrial systems....
Books and eBooks
Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them
This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions....
Books and eBooks
Data Diodes vs. Unidirectional Gateways
Waterfcomprehensive guide to data diodes and unidirectional gateways demystifies the key differences between them....
Books and eBooks
The 2025 OT Cyber Threat Report
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments....
Trending posts
I don’t sign s**t – Episode 143
September 10, 2025
NIS2 and the Cyber Resilience Act (CRA) – Episode 142
August 18, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks....
Case studies
UAE Based Oil & Gas Refinery
How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud....
Case studies
Securing a European TSO
Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats....
Case studies
Cybersecurity for LNG Ports
Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations....
Case studies
Unidirectional Protection For Railway Signaling Networks
Enabling 100% secure remote monitoring of rail signaling and control networks, enabling SOC and corporate IT systems with secure visibility into signaling networks....
Case studies
Enabling The Digital Refinery
Protecting critical equipment of a highly sensitive petrochemicals processing plant, while improving production performance with real-time, actionable, and predictive analytics....
Trending posts
SCADA Security Fundamentals
August 14, 2025
What is OT Network Monitoring?
August 14, 2025
What Is ICS (Industrial Control System) Security?
August 14, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity, from the dawn of electronic computers to today’s hyper-connected world....
Infographic
Infographic: Top 10 OT Cyberattacks of 2024
Infographic mapping out the top 10 OT cyberattacks of 2024 including WHEN it happened, WHICH industry, WHAT happened and also covering the consequences and significance of each attack...
Infographic
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks
Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations. Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations....
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted industrial operations, specifically Operational Technology (OT) and Industrial Controls Systems (ICS) that are commonly used within critical and important infrastructure....
Infographic
Ransomware Attack on Data Center Infrastructure (Infographic)
Learn how legacy approaches for Data Center infrastructure protection still leave critical networks exposed to attacks....
Trending posts
Network Duct Tape – Episode 141
August 13, 2025
Credibility, not Likelihood – Episode 140
August 6, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Podcast
We can’t – and shouldn’t – fix everything – Episode 147
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance....
Podcast
Medical Device Cybersecurity Is Tricky – Episode 146
Yes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers....
Podcast
Hardware Hacking – Essential OT Attack Knowledge – Episode 145
If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems....
Podcast
Managing Risk with Digital Twins – What Do We Do Next? – Episode 144
How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions....
Podcast
I don’t sign s**t – Episode 143
Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do....
Podcast
NIS2 and the Cyber Resilience Act (CRA) – Episode 142
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kieffer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators....
Trending posts
What Is Industrial Control System Software?
July 16, 2025
Lessons Learned From Incident Response – Episode 139
July 9, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
past webinars
Analyzing Recent NIS2 Regulations – OT security is changing
One EU nation after another is releasing new regulations for their energy infrastructures to comply with the NIS2 directive. Jørgen Hartig of SecuriOT in Denmark joins us to look at the recent Danish, Norwegian, Finnish and other rules....
past webinars
Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation
Learn how secure access can enhance both safety and performance in renewable energy operations....
past webinars
The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next
What’s driving the sudden surge in OT capable malware? Who’s behind these threats and how should our defenses evolve to keep pace?...
past webinars
13 Ways to Break a Firewall (and alternatives for OT security)
Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems....
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox
Power
Oil & Gas
Water & Wastewater
Manufacturing
Facilities
Transportation