<img alt="" src="https://secure.365smartenterprising.com/789934.png" style="display:none;">

Tim Mullen

Insights on Retrofitting Security Monitoring with OBEC

Today, most large industrial installations are constructed by integrating a variety of equipment procured from specialty OEMs and subcontractors. These third parties include operational technology (OT) assets as part of their packaged solutions and are responsible for configuring the digital devices that ultimately communicate with other systems in the final installation. However, if an end user’s security requirements are not adequately specified at the beginning of a project, procured OT systems may not be configured in a manner to support security objectives such as network monitoring. All too often, end users are stuck making post-installation fixes, and the options to do so are typically costly or physically impractical.

Breaking New Ground in OT Cybersecurity with OBEC

Communications in an operational technology (OT) environment are complex: both logical and physical...

Babuk Ransomware Tactics and the Case for Stronger Industrial DMZs

In 2021, Babuk ransomware burst onto the scene and quickly made headlines for its disruptive...

Don’t Wait for a Cyberattack – Test Your OT Defenses with Tabletop Exercises

When cyber incidents occur on an OT asset, the consequences can be dire – disrupted production,...

Keep Your Critical OT Infrastructure Secure with Proper Patching

Patching is a critical line of defense in protecting OT assets from cyber threats. Simply put,...

Bridging the Gap: The Imperative for IT Expertise in OT Manufacturing Cyber Security

As industrial facilities embark on their digital transformation journey, the integration of smart...

How to Use Engineering Specs to Ensure OT Cybersecurity in Public Infrastructure

Discussing operational technology (OT) and public facilities, such as hospitals and universities,...

Previewing the Upcoming Changes in NIST CSF v2.0

For those who haven’t heard, NIST is in the process of updating the Cybersecurity Framework (CSF)...

Reducing the Costs of Implementing Cybersecurity Policy

Threat actors looking to target your OT assets are constantly refining their processes to identify...

Understanding CIA in an OT environment

Any IT professional will tell you that the CIA triad is key to understanding, evaluating, and...