July 14, 2023
Zero Trust – A Virtual Air Gap for OT Security
Air-gapping computer and operational technology (OT) networks is a long-established method of protecting sensitive information and reducing the risk of [...]
June 14, 2023
Zero Trust for OT Security – Shields Up vs Damage Report
In the original and newer Star Trek episodes and movies, the captain would order “shields up” or "raise shields" prior [...]
May 31, 2023
Zero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt
The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for [...]
March 14, 2023
Zero Trust Security for Building Automation: What You Need to Know
Building automation systems (BAS) are becoming increasingly common in commercial buildings, providing centralized control of building operations, including HVAC, lighting, [...]
January 18, 2023
Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This [...]
January 11, 2023
Benefits of Zero Trust for OT Cybersecurity
Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, [...]
September 15, 2022
Applying Zero Trust to OT Networks For Smart Buildings
How to apply Zero Trust to OT networks for Smart Buildings? In December 2021, a ransomware attack locked a BAS [...]
January 1, 2006
IoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary
Cybersecurity Blog Post Summary - IoT / OT / Smart Building / BACnet List of Veridify Security blog posts back [...]

