Security For Operational Technology

Security For Operational Technology

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices

On Dec 5th, 2019, Unit 42 researchers discovered a new variant of the Muhstik botnet that adds a scanner to now attack Tomato routers for the first time by web authentication brute forcing. Tomato is an open source alternative firmware for routers. …

   1,573   2020-01-24   0 Read More

The security market lives together with Internet economy. With the market saturation, is there any potential in transitional IT industry? Maybe yes, but the investment a…

   1,175   2019-03-22   0 Read More

Enterprise solution for OT security

If you can’t see it, you can’t secure it. That's the problem every OT environment has. Various of devices, various of vendor system, not standard to IT protocol. Some system are poorly designed. No assets or inventory management. No one knows how…

   987   2018-06-06   0 Read More

Mikrotik RouterOS product is a good fit for OT space

Mikrotik product provides a enterprise function and stability on the network but consumer level cost. Its POE solution and CAPSMAN wireless management solution is very suitable for OT space. It also provides a good security protection for its ecos…

   959   2017-12-22   0 Read More

Do we still need network tapping since all traffic is encrypted?

These days I keep thinking whether we still need network tapping solution for the real-time security threat monitoring since majority of applications are going to end-to-end encryption. Not much content the legacy network tapping and analytic device…

   1,168   2017-11-10   0 Read More

What is OT Risk?

What is OT? Operational Technology (OT) – the hardware and software dedicated to detecting or causing changes in physical processes through direct monitoring and/or control of physical devices such as valves, pumps, etc. Simply put, OT is the …

   1,130   2017-10-17   0 Read More