ACE Blog

Check out our blogs where we offer our advice and experience on relevant topics to help you improve your OT systems.

Posts about

Cybersecurity

Previewing the Upcoming Changes in NIST CSF v2.0

For those who haven’t heard, NIST is in the process of updating the Cybersecurity Framework (CSF)...

Reducing the Costs of Implementing Cybersecurity Policy

Threat actors looking to target your OT assets are constantly refining their processes to identify...

An OT New Year’s Resolution

As we say goodbye to 2022, our thoughts inevitably turn to the new year and all the things that we...

Understanding CIA in an OT environment

Any IT professional will tell you that the CIA triad is key to understanding, evaluating, and...

Developing a Comprehensive, Multi-Phased Cybersecurity Plan

Just like most manufacturing facilities, the plant floor at Charter Steel, an American supplier of...

Ensure Your Control System Functions after DCOM is Hardened

Since the 90’s Microsoft has included the Distributed Component Object Model (DCOM), under a few...

Implications of Log4J in your Control System

Recently across the news there has been a lot of discussion about “Log4J vulnerability” This is a...

Working with OMAC to Develop Industry Best Practices for Remote Access Security

In the past decade or so, many organizations have incorporated network connectivity into their...

Don't Let Your Remote Access Platform Be Your Cybersecurity Weakness

Today, many critical infrastructure facilities, such as water and sewage treatment plants, have...