The process of securely adding new devices or users to an OT network, ensuring they comply with security policies.
Read MoreFind what you're looking for by selecting the first letter of your topic.
Verifying that OT systems and data remain unchanged from their intended state.
A network of interconnected devices capable of communicating and exchanging data.
Tools that monitor OT networks and devices for unauthorized access or activity.
Systems that actively block detected threats in OT environments.
Securing industrial IoT devices to prevent vulnerabilities and unauthorized access.
A network segmentation strategy to prevent external access to OT systems.
Protecting devices with JTAG interfaces (used for debugging hardware) from exploitation by attackers.
Cyberattacks that interfere with wireless communications, disrupting data exchange in OT environments.
Securing JRE configurations in OT applications to prevent exploitation.
A scripting language that automates and secures tasks in industrial systems.
Real-time oversight of automated jobs in OT systems to detect anomalies or unauthorized changes.
Coordinated response efforts among multiple stakeholders to address cybersecurity incidents affecting OT systems.
Collaboration between OT and IT teams to safeguard industrial networks from cyber threats.
Specialized servers that provide secure, monitored access to isolated OT environments.
Adhering to regional laws and regulations specific to OT cybersecurity and critical infrastructure.
Timely application of security patches to OT systems to minimize vulnerability windows.
Granting elevated access rights temporarily and revoking them after use to minimize risk.
Ensuring all access to OT networks is essential, monitored, and appropriately logged.
Tracking performance metrics of OT cybersecurity systems to ensure operational security.
Protecting the core of an operating system (kernel) in OT devices against vulnerabilities and exploits.