Strategies for expertly protecting industrial control systems

Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations Technology, a collection of affordable and practical approaches that thoroughly defeat … Continue reading Strategies for expertly protecting industrial control systems

Best practice methodology for industrial network security: SEC-OT

Secure Operations Technology (SEC-OT) is a methodology and collection of best practices inspired by a decade of experience working with secure industrial sites. The SEC-OT approach is counter-intuitive to many IT and even industrial control system (ICS… Continue reading Best practice methodology for industrial network security: SEC-OT

Many water and energy systems vulnerable to significant cyber risk

New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be exploited, causing significant real-world impacts, such as contaminating the water sup… Continue reading Many water and energy systems vulnerable to significant cyber risk

Safeguarding global critical networks now and in the future

Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions for industrial control networks and critical infrastructures. In this interview… Continue reading Safeguarding global critical networks now and in the future

Unidirectional Security Gateways provide safe IT/OT integration to Chinese industry

Waterfall’s flagship products were awarded China Compulsory Product Certification (CCC). The CCC Mark is essential for any manufacturer selling to Chinese manufacturers, industries and critical infrastructures. With CCC certification in place, Ch… Continue reading Unidirectional Security Gateways provide safe IT/OT integration to Chinese industry

The risk to OT networks is real, and it’s dangerous for business leaders to ignore

Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the internet, and weak anti-virus protections. Although the prevalence of Windows XP an… Continue reading The risk to OT networks is real, and it’s dangerous for business leaders to ignore

The future of OT security in modern industrial operations

Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber… Continue reading The future of OT security in modern industrial operations

Safe IT/OT integration with unidirectional security gateways

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of … Continue reading Safe IT/OT integration with unidirectional security gateways

Vulnerabilities and architectural considerations in industrial control systems

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of … Continue reading Vulnerabilities and architectural considerations in industrial control systems

Maliciuos hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on software, but the historical focus of crime is on anything… Continue reading Maliciuos hacking activity increasingly targeting critical infrastructure