• July 14, 2023

    Zero Trust – A Virtual Air Gap for OT Security

    Air-gapping computer and operational technology (OT) networks is a long-established method of protecting sensitive information and reducing the risk of [...]

  • June 14, 2023

    Zero Trust for OT Security – Shields Up vs Damage Report

    In the original and newer Star Trek episodes and movies, the captain would order “shields up” or "raise shields" prior [...]

  • May 31, 2023

    Zero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt

    The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for [...]

  • March 14, 2023

    Zero Trust Security for Building Automation: What You Need to Know

    Building automation systems (BAS) are becoming increasingly common in commercial buildings, providing centralized control of building operations, including HVAC, lighting, [...]

  • January 18, 2023

    Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity

    Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This [...]

  • January 11, 2023

    Benefits of Zero Trust for OT Cybersecurity

    Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, [...]

  • September 15, 2022

    Applying Zero Trust to OT Networks For Smart Buildings

    How to apply Zero Trust to OT networks for Smart Buildings? In December 2021, a ransomware attack locked a BAS [...]

  • January 1, 2006

    IoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary

    Cybersecurity Blog Post Summary - IoT / OT / Smart Building / BACnet List of Veridify Security blog posts back [...]