<img alt="" src="https://secure.365smartenterprising.com/789934.png" style="display:none;">

ACE Blog

Check out our blogs where we offer our advice and experience on relevant topics to help you improve your OT systems.

Posts about

Cybersecurity

How to Use Engineering Specs to Ensure OT Cybersecurity in Public Infrastructure

Discussing operational technology (OT) and public facilities, such as hospitals and universities,...

Navigating an OT Cybersecurity Transformation

The gap between IT and OT systems has been steadily closing in recent years, making systems more...

Previewing the Upcoming Changes in NIST CSF v2.0

For those who haven’t heard, NIST is in the process of updating the Cybersecurity Framework (CSF)...

Reducing the Costs of Implementing Cybersecurity Policy

Threat actors looking to target your OT assets are constantly refining their processes to identify...

An OT New Year’s Resolution

As we say goodbye to 2022, our thoughts inevitably turn to the new year and all the things that we...

Understanding CIA in an OT environment

Any IT professional will tell you that the CIA triad is key to understanding, evaluating, and...

Developing a Comprehensive, Multi-Phased Cybersecurity Plan

Just like most manufacturing facilities, the plant floor at Charter Steel, an American supplier of...

Ensure Your Control System Functions after DCOM is Hardened

Since the 90’s Microsoft has included the Distributed Component Object Model (DCOM), under a few...

Implications of Log4J in your Control System

Recently across the news there has been a lot of discussion about “Log4J vulnerability” This is a...

Working with OMAC to Develop Industry Best Practices for Remote Access Security

In the past decade or so, many organizations have incorporated network connectivity into their...