Guardian of OT

Blog

Get my thoughts on IT/OT Security and the latest developments in the industry

Adversary-in-the-Middle (AiTM) phishing attacks on Operational Technology (OT) Systems

Adversary-in-the-Middle (AiTM) phishing attacks on operational technology (OT) systems target the critical infrastructure and industrial…

Read More

Sneak Peek into Cyber Threats in Integrated Control Systems

Introduction:Integrated control systems, which combine operational technology (OT) and information technology (IT), bring numerous benefits…

Read More

Understanding the Similarities and Differences Between IEC 62443 and ISO 27001

Introduction:With the increasing focus on cybersecurity and the growing interconnectedness of operational technology (OT) and…

Read More

Cyber Threats on Stand-Alone Systems: Protecting Programmable Logic Controllers (PLCs)

Introduction:Stand-alone systems, such as Programmable Logic Controllers (PLCs), play a crucial role in industrial automation…

Read More

Cyber Spies in Integrated Control Systems: Uncovering the Invisible Intruders

Introduction:In the realm of cybersecurity, the presence of cyber spies holds a unique intrigue. These…

Read More

Man-in-the-Middle Attack on Integrated Control Systems: A Stealthy Threat to Industrial Infrastructure

Introduction:With the advent of the digital era, integrated control systems have become the backbone of…

Read More

Unveiling Cyber Weaknesses in the Latest Operational Technology Systems

Introduction:Operational technology (OT) systems are the backbone of critical infrastructure, powering industries such as energy,…

Read More

Debunking Misconceptions: The Purdue Model in Operational Technology is Not a Scapegoat

Introduction:The Purdue model, also known as the Purdue Enterprise Reference Architecture, is a widely accepted…

Read More

The Next Battlefield: Operational Technology and the Rise of Cyber Warfare

Introduction:As we navigate the ever-evolving digital landscape, the realm of warfare has expanded beyond traditional…

Read More

Debunking the Myth: Is Continuous Proof of Trust in Operational Technology a Misnomer?

Introduction:In an era where operational technology (OT) plays a critical role in various industries, ensuring…

Read More