⚙️ Our free OT PCAP Analyzer has been updated!
View PCAP Analyzer v2.0 features
X
Search
Blog
Contact Us
FREE PCAP Analyzer
Company
About EmberOT
Leadership
Our Partners
Events
Product
EmberOT In-Depth
Asset Inventory & Insights
Vulnerability & Risk
Detection
PCAP Analyzer Free Tool
Firewatch Assessment
IgniteOnsite
Resources
Resources
Blog
Documents
Podcasts
Newsroom
Solutions
Solutions
Oil & Gas
Electric Utilities
Industrial IoT
Manufacturing
Rural Co-ops
Request a Demo
Company
About EmberOT
Leadership
Our Partners
Events
Product
EmberOT In-Depth
Asset Inventory & Insights
Vulnerability & Risk
Detection
PCAP Analyzer Free Tool
Firewatch Assessment
IgniteOnsite
Resources
Resources
Blog
Documents
Podcasts
Newsroom
Solutions
Solutions
Oil & Gas
Electric Utilities
Industrial IoT
Manufacturing
Rural Co-ops
Request a Demo
industrial cybersecurity
Cybersecurity Musings
October 3, 2025
Establishing Visibility with OT Asset and Network Baselines
Operators, analysts, and OT practitioners all know that defending and improving the operations of an industrial environment...
Read more
Cybersecurity Musings
September 25, 2025
Enhancing OT Vulnerability Management with Visibility
Vulnerability management is crucial for ensuring safety, operations, compliance, and information security in operational...
Read more
Cybersecurity Musings
September 18, 2025
Detecting Threats and Anomalies in OT Environments: The Basics
When it comes to maintaining operations in critical infrastructure organizations, knowing what’s going on in your environment...
Read more
Cybersecurity Musings
September 3, 2025
The Basics Behind Building an Asset Inventory in OT Environments
Successfully implementing a project in your OT (operational technology) environment, whether it’s for security, operations,...
Read more
Cybersecurity Musings
August 28, 2025
The OSI Model for OT Visibility
The OSI (Open Systems Interconnection) model describes how different devices and systems communicate with each other. The...
Read more
Cybersecurity Musings
August 20, 2025
Internal Network Security Monitoring (INSM) for OT Environments
Internal Network Security Monitoring (INSM) is a process or solution that monitors activity on a network with the goal of...
Read more
Cybersecurity Musings
August 14, 2025
Cutting Through the Noise: Leveraging Operator Knowledge in Cybersecurity
You are off to a great start: Your organization has a network security monitoring solution deployed and configured. Traffic...
Read more
Cybersecurity Musings
August 6, 2025
Purdue Model as a Reference for Segmentation
Most people in the ICS/OT space are familiar with the Purdue model, formally known as the Purdue Enterprise Reference Architecture...
Read more
Cybersecurity Musings
July 25, 2025
Maintaining Compliance Amid IT/OT Convergence
If you’ve worked in or adjacent to OT, you’ve most likely heard the term IT/OT convergence. And though the industry...
Read more
Podcasts
June 27, 2025
Industrial Cybersecurity Explained - The Cyber Vault podcast
Jori VanAntwerp joins Katie Soper on the Cyber Vault podcast for the “Industrial Cybersecurity Explained” episode,...
Read more
Scroll to top