GuardianTechpapersCustom OT Device Inventory in GuardianOctober 17, 2024question_answer0The core of any network, whether IT or OT, lies in the devices that comprise it. For this reason, it…
Strategic ConsultingTechnical ConsultingTechpapersIndustrial Automation: How It Works, Systems, Benefits, and ChallengesApril 29, 2024question_answer0Industrial automation (IA) refers to the use of computerised systems or elements, such as computers, programmable logic controllers, robots and…
Strategic ConsultingTechpapersNIS2: The new european directive on cibersecurityJanuary 25, 2024question_answer0On December 14, 2022, the European Parliament and the Council of the European Union approved the directive known as NIS2…
Strategic ConsultingTechpapersOT NIST SP 800-82: introduction and 3rd revisionNovember 2, 2023question_answer0The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce. It was…
GuardianTechpapersThe Industrial Demilitarized ZoneJune 14, 2023question_answer0In the field of network security, there is a design pattern used to strengthen the defenses of those networks that…
Strategic ConsultingTechpapersTISAX: Information Security in the Automotive IndustryJune 8, 2023question_answer0Abstract– TISAX is an information security standard developed by the Association of the German Automotive Industry (VDA) for the evaluation…
GuardianTechpapersGIT in InprOTech GuardianMay 15, 2023question_answer0Git is a distributed version control system used to track changes to a project’s source code. It was created by…
R&DTechpapersS7Comm protocol: security analyzedJanuary 19, 2023question_answer0The S7 Communication protocol (hereafter S7Comm) is a Siemens proprietary protocol that first appeared in 1994 with the launch of…
GuardianTechpapersMeasuring the hardware capacities for OT Devices in an ICSNovember 24, 2022question_answer0When developing a new solution for network analysis and monitoring, choosing the right hardware configuration is a one of the…
GuardianTechpapersVulnerability scanners in OT networks: a quick overviewSeptember 21, 2022question_answer0The field of cybersecurity has a well deserved relevance into the operational design of any company or organization nowadays. While…