Search results for: zero trust
Webinar – Zero Trust Security: Stopping Cyberattacks on Industrial Control Systems
Zero Trust – A Virtual Air Gap for OT Security
Air-gapping computer and operational technology (OT) networks is a long-established method of protecting sensitive information and reducing the risk of operational disruption. A growing trend has been to provide connectivity from these networks to the Internet for remote monitoring and control, real-time data, data analysis, predictive maintenance, improving inventory and resource management, achieving faster decision-making,…
Read MoreZero Trust for OT Security – Shields Up vs Damage Report
In the original and newer Star Trek episodes and movies, the captain would order “shields up” or “raise shields” prior to an attack to prevent damage to the USS Enterprise. The shields were some sort of force field of which the physics is never fully described. During or after an attack the captain would request…
Read MoreZero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt
The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for increased efficiency and automation. However, this digital transformation also brings forth significant cybersecurity challenges. Perimeter security is not a sufficient solution and legacy devices and systems often lack robust security measures, leaving critical infrastructure vulnerable…
Read MoreZero Trust Security for Building Automation: What You Need to Know
Building automation systems (BAS) are becoming increasingly common in commercial buildings, providing centralized control of building operations, including HVAC, lighting, access control, elevators, and life safety systems. While these systems can increase energy efficiency and reduce costs, they also pose significant security risks. In recent years, there have been several high-profile attacks on building automation…
Read MoreDifferences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…
Read MoreBenefits of Zero Trust for OT Cybersecurity
Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, and events in an organization. These systems are critical to the functioning of many industries, including manufacturing, energy, transportation, and utilities. In recent years, there has been an increased focus on securing OT systems due…
Read MoreApplying Zero Trust to OT Networks For Smart Buildings
How to apply Zero Trust to OT networks for Smart Buildings? In December 2021, a ransomware attack locked a BAS firm and its building client out of the system, taking out 75% of smart building OT. Using device-level SaaS security in a NIST-compliant Zero Trust framework, BAS vendors can prevent smart building breaches. SaaS security for…
Read MoreFuture-Proofing OT Cybersecurity
Video URL: https://vimeo.com/1104166370 Video Transcript Future-Proofing OT Cybersecurity Welcome to our presentation on future-proofing operational technology – or OT – cybersecurity and where we can go next. In this presentation, we will review the current landscape and frameworks used to provide cybersecurity for OT environments, examine today’s solutions, and explore future directions to protect our…
Read MoreBenefits of Encryption for OT Networks
Encryption of OT networks and devices, such as sensors, controllers, and other automation systems, is essential for securing modern industrial and building environments. As these devices are increasingly networked and remotely managed, the risks of unprotected communication grow. Why OT Communications are Not Encrypted OT communications lack encryption for several reasons: Network Isolation: Historically, OT…
Read More