Application Security Weekly: OT Security

It's no surprise that OT security has fared poorly over the last 30+ years. To many appsec folks, these systems have uncommon programming languages, unfamiliar hardware, and brittle networking stacks. They also tend to have different threat scenarios. Many of these systems are designed, successfully, to maintain availability. But when a port scan can freeze or crash a device, that availability seems like it hasn't put enough consideration into adversarial environments. We chat about the common failures of OT design and discuss a few ways that systems designed today might still be secure 30 years from now.

Meet Our Speakers

Huxley Barbee

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
Vulnerabilities, CVEs and the attack surface
Listen as Stephen Pritchard, Security Insights, talks with VP of Security Research Tod Beardsley about vulnerabilities, CVEs, and the attack surface.
Podcasts
The often-overlooked truth in cybersecurity: seeing the unseen in vulnerability management
Sean Martin (ITSPmagazine) speaks with HD Moore about an overlooked truth in cybersecurity: the greatest risks are usually the things you don’t...
Podcasts
You can’t get there from here: why we need a new way to manage exposure
At Black Hat 2025, CyberRisk TV sits down with HD Moore for a no-BS conversation on why vulnerability management is still failing enterprises.
Podcasts
Is Vuln Management Dead?
HD Moore joins Paul's Security Weekly to share how vulnerability management and asset discovery are evolving in the age of emerging technologies....

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.