Application Security Weekly: OT Security

It's no surprise that OT security has fared poorly over the last 30+ years. To many appsec folks, these systems have uncommon programming languages, unfamiliar hardware, and brittle networking stacks. They also tend to have different threat scenarios. Many of these systems are designed, successfully, to maintain availability. But when a port scan can freeze or crash a device, that availability seems like it hasn't put enough consideration into adversarial environments. We chat about the common failures of OT design and discuss a few ways that systems designed today might still be secure 30 years from now.

Meet Our Speakers

Huxley Barbee

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
Only a third of KEV vulnerabilities are truly critical; are you prioritizing the wrong ones?
Discover how KEVology and the KEV Collider help defenders cut through the noise by enriching KEV data with exploit scores, timelines, & real-world...
Podcasts
Filtering the KEV was really hard … until now! (Risky Biz Interview)
Casey Ellis chats with Todd Beardsley about KEVology — an analysis of the CISA KEV. KEVology helps you identify the vulnerabilities most relevant...
Podcasts
The dangers of white label devices (Error Code Podcast)
Rob King, Director of Applied Security Research, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments,...
Podcasts
Lessons from the front lines of cybersecurity with HD Moore (Keep Austin Secure)
In this episode of Keep Austin Secure, Elliot Fielding sat down with HD Moore, Founder & CEO of runZero and it lived up to the hype.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.