The process of controlling network traffic flow in OT environments to prevent delays or disruptions caused by congestion.
Read MoreFind what you're looking for by selecting the first letter of your topic or use the search bar below.
A physical device that manages and protects cryptographic keys in OT environments.
Continuous assessment of OT systems and devices to detect issues or anomalies that may impact performance or security.
Designing OT systems to ensure minimal downtime and uninterrupted operations during failures or maintenance.
A decoy system designed to attract and analyze potential cyberattacks in OT environments.
Security software installed on individual OT devices to detect unauthorized activity or changes.
The interface that allows operators to interact with OT systems and monitor industrial processes.
Measures to protect virtualized OT environments managed by hypervisors.
Processes and tools to authenticate and authorize users accessing OT systems.
A security practice where OT system components are replaced, not altered, ensuring consistency and reliability.
Assessing the potential effects of cybersecurity incidents on OT systems and operations.
Techniques used to analyze and understand the causes and impacts of security incidents in OT.
The systematic recording of events and actions for monitoring and auditing purposes in OT.
A structured approach to managing and mitigating cybersecurity incidents in OT environments.
Using test scenarios to prepare for potential cybersecurity incidents in OT environments.
Integrated systems monitor and control industrial processes, including SCADA, DCS, and PLCs.
IoT technologies for enhanced connectivity and data analysis in industrial settings.
Measures to protect communication networks within industrial environments from cyber threats.
Communication standards like Modbus, DNP3, and OPC UA used in OT environments.
Collaborative exchange of threat intelligence among OT stakeholders to improve security awareness and response.
BlastWave is taking on one of the biggest challenges in the cybersecurity market - protecting a nation’s critical infrastructure. We deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks. Our products were designed for OT networks with a single-minded focus on keeping them easy to use.