My posts are my own and are not a reflection of my place of work or employer.
X: @Secure_ICS_OT
Mastodon: https://infosec.exchange/@Secure_ICS_OT
#ICS #OT #GICSP #IEC62443
In IT a computer is a general purpose machine with business applications.
In ICS/OT workstations are task based machines with specific software that is licensed for either engineering work, operations work or even operating specific test equipment.
In IT a computer is a general purpose machine with business applications.
In ICS/OT workstations are task based machines with specific software that is licensed for either engineering work, operations work or even operating specific test equipment.
IT and Security are completely oblivious to plain text smtp flowing through their system with the information they are asking me for.
Just saying.
IT and Security are completely oblivious to plain text smtp flowing through their system with the information they are asking me for.
Just saying.
In ICS/OT you need to understand what the switch is doing and if it is part of the process.
Rebooting it or changing settings could cause a process to shutdown, loss of control, create a safety issue or put equipment at risk.
In ICS/OT you need to understand what the switch is doing and if it is part of the process.
Rebooting it or changing settings could cause a process to shutdown, loss of control, create a safety issue or put equipment at risk.
Just saying.
Just saying.
It's great information and I appreciate the insight, but it's marketing material designed to drive sales.
It's great information and I appreciate the insight, but it's marketing material designed to drive sales.
If you freak out when the ICS/OT shows you the ICS/OT.
If you freak out when the ICS/OT shows you the ICS/OT.
None have been by firms that understand ICS/OT and none have flagged the glaring architectural error I currently have.
I suggest getting an audit done by a firm that understands ICS/OT.
None have been by firms that understand ICS/OT and none have flagged the glaring architectural error I currently have.
I suggest getting an audit done by a firm that understands ICS/OT.
They might not be the same.
They might not be the same.
Instead of the actual vulnerability which was threat actors bypassing the museum's security with a simple smash and grab.
Speaks volumes.
Instead of the actual vulnerability which was threat actors bypassing the museum's security with a simple smash and grab.
Speaks volumes.