Guardian of OT

Blog

Get my thoughts on IT/OT Security and the latest developments in the industry

The Evolutionary Leap: Is the OT SOC the Future of Operational Technology Systems?

Introduction:As operational technology (OT) systems face increasingly sophisticated cyber threats, the need for dedicated security…

Read More

The Hidden Dangers: USB Cyber Threats on Operational Technology Systems

Introduction:As operational technology (OT) systems become increasingly interconnected, the risk of cyber threats through USB…

Read More

Ransomware Strikes: The Alarming Rise of Attacks on Operational Technology Systems

Introduction:Ransomware attacks are no longer limited to traditional IT systems—operational technology (OT) systems, such as…

Read More

On the Wires: Exploring the Trade-offs of Single Touch Point vs. Multiple Touch Points to Internet Connectivity in Integrated Control System Networks

Introduction:Internet connectivity plays a crucial role in modern integrated control system (ICS) networks, enabling remote…

Read More

Battle of Networks: Assessing the Security of IP Networks vs. Traditional Proprietary Networks in Integrated Control Systems

Introduction:The increasing convergence of operational technology (OT) and information technology (IT) has led to a…

Read More

Bridging the Gap: Exploring the Zero Air Gap in Integrated Control Systems Networks

Introduction:Modern integrated control systems (ICS) are the backbone of critical infrastructures such as power plants,…

Read More

Living Dangerously: Windows 7 OS in Integrated Control Systems

Introduction:The end of support for Windows 7, a popular operating system (OS) from Microsoft, has…

Read More

Winner Takes All: Centralized Patching vs. Distributed Patching in Integrated Control Systems

Introduction:Keeping integrated control systems secure is a top priority for industries like energy, manufacturing, and…

Read More

The Cyber Pirates of Operational Technology: Securing Critical Infrastructure

Introduction:In today’s interconnected world, cyber threats have evolved beyond traditional IT systems. With the rise…

Read More

Unveiling Vulnerabilities in Secured VPN Access to Integrated Control Systems

Introduction:In recent years, integrated control systems have become an integral part of various industries such…

Read More