Videos
OT-Threats
Rarely visible to OT operators, but always a cause for concern: atypical communication changes in OT networks can indicate anything from network disruptions to malicious behavior or legit maintenance personnel activities. We explain what can be seen with OT monitoring and how to separate the wheat from the chaff.
OT-Threats
Vulnerable operating systems and software can be found in almost all industrial infrastructures. From Windows 95 to outdated libraries and firmware riddled with vulnerabilities, we have seen it all during Rhebo Industrial Security Assessments. We explain what the results imply and why it is important in OT.
OT-Threats
In this video, we explain how the misconfiguration of network protocols can create an open flank in OT networks. The focus of this video and the Rhebo Industrial Security Assessment findings: DHCP and ICMP communication, which can become security-relevant for the operation of industrial facilities.