Is OT Software-Defined Networking (SDN) a Real Thing or a Pipe Dream?
Software-Defined Networking (SDN) has been one of the most talked-about concepts in enterprise networking over the past decade. Promising centralized control, automation, and increased visibility, SDN is often positioned as a modern alternative to traditional,...
OT/ICS Penetration Tests Are Worth It (But Only If You’re Ready)
Penetration testing is often considered an essential tool for identifying vulnerabilities in IT environments. But when it comes to Operational Technology (OT) and Industrial Control Systems (ICS), penetration testing can be a double-edged sword. Many organizations...
Implementing API 1164 Cybersecurity Guidelines in the Pipeline Industry
In today's digital age, the pipeline industry faces increasing cybersecurity threats that can jeopardize operations, safety, and data integrity. To address these challenges, the American Petroleum Institute (API) introduced API 1164, a comprehensive cybersecurity...
Myth: “My Small OT Network Won’t Be Targeted”
In the cybersecurity landscape, a common myth continues to threaten operational technology (OT) environments: “Our network is too small to be a target.” This belief, though seemingly reasonable, is dangerously outdated and disconnected from today's threat landscape....
Navigating Cybersecurity in Maritime: A Guide to BIMCO’s Cybersecurity Guidance
The maritime industry is navigating uncharted digital waters. With ships increasingly relying on sophisticated technologies for navigation, communication, and cargo management, they are also becoming prime targets for cyber threats. To address these vulnerabilities,...
Industry-Specific Standards: TSA Security Directive
Introduction: A Wake-Up Call for Transportation Security In May 2021, the Colonial Pipeline ransomware attack sent shockwaves around the world. A criminal group exploited weak VPN credentials to penetrate the company’s IT systems, forcing Colonial to shut down 5,500...
An Introduction to the NERC CIP Standards
Introduction and Background Introduction and Background At Enaxy, we recently wrapped up a blog series exploring how organizations can choose the right cybersecurity standard to build or enhance their OT/ICS security programs. That series focused on broadly...
Myth: OT Systems Are “Isolated” and Immune from Cyberattacks
Introduction In industrial and critical infrastructure circles, few security concepts have been as misunderstood and misapplied as the idea of the “air gap.” For decades, operational technology (OT) networks were assumed to be physically isolated from any external...
Myths of OT Cybersecurity: Debunking the Dangerous Assumptions
Introduction In the digital era, cybersecurity has become a boardroom conversation, especially in sectors that rely heavily on Operational Technology (OT). From energy and utilities to manufacturing, pharmaceuticals, and transportation, OT environments underpin some...
If you are frustrated at wasted time and resources spent on security projects with nothing to show for it, or need your security or operations team to do more with less, give us a call at (469) 574-4000 or send a message to [email protected]. Let’s see how we can help ensure your assets are secure.