Application Security Weekly: OT Security

It's no surprise that OT security has fared poorly over the last 30+ years. To many appsec folks, these systems have uncommon programming languages, unfamiliar hardware, and brittle networking stacks. They also tend to have different threat scenarios. Many of these systems are designed, successfully, to maintain availability. But when a port scan can freeze or crash a device, that availability seems like it hasn't put enough consideration into adversarial environments. We chat about the common failures of OT design and discuss a few ways that systems designed today might still be secure 30 years from now.

Meet Our Speakers

Huxley Barbee

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
Is Vuln Management Dead?
HD Moore joins Paul's Security Weekly to share how vulnerability management and asset discovery are evolving in the age of emerging technologies....
Podcasts
Metasploit's Origin, Browser Bugs & Exposure Management
HD shares the story of building the top pen testing framework, early cybersecurity tales, and how his Month of Browser Bugs ended ActiveX.
Podcasts
From Vulnerability to Visibility: Rethinking Exposure Management
Learn how exposure management is evolving and how organizations can move from simply identifying vulnerabilities to gaining true visibility and...
Podcasts
Risky Biz Interview: HD Moore on why vuln scanners are awful and broken
Hear HD Moore on why vulnerability scanning is broken, and how runZero aims to fix it by pairing its discovery tech with the open-source Nuclei...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.