✨ NEW REPORT -- ICS/OT Vulnerability Intelligence Report analyzes all ICS CVEs from 2024-2025
View the Report
X
Search
Blog
Contact Us
FREE PCAP Analyzer
Company
About EmberOT
Leadership
Our Partners
Events
Product
EmberOT In-Depth
Asset Inventory & Insights
Vulnerability & Risk
Detection
PCAP Analyzer Free Tool
Firewatch Assessment
IgniteOnsite
Resources
Resources
Blog
Documents
Podcasts
Newsroom
ICS OT Vulnerability Intelligence Report 2024-2025
Solutions
Solutions
Oil & Gas
Electric Utilities
Industrial IoT
Manufacturing
Rural Co-ops
Request a Demo
Company
About EmberOT
Leadership
Our Partners
Events
Product
EmberOT In-Depth
Asset Inventory & Insights
Vulnerability & Risk
Detection
PCAP Analyzer Free Tool
Firewatch Assessment
IgniteOnsite
Resources
Resources
Blog
Documents
Podcasts
Newsroom
ICS OT Vulnerability Intelligence Report 2024-2025
Solutions
Solutions
Oil & Gas
Electric Utilities
Industrial IoT
Manufacturing
Rural Co-ops
Request a Demo
industrial cybersecurity
Cybersecurity Musings
March 26, 2026
PCAP Analysis for OT Visibility
PCAPs (packet captures) are invaluable information sources for identifying assets and activities on a network. We’ve talked...
Read more
Cybersecurity Musings
November 20, 2025
What to Expect When You’re Expecting… a NERC CIP Audit (Part 2)
This is the second in a two-part NERC CIP series, and now we get into the heart of it. Instead of looking at the audit process,...
Read more
Cybersecurity Musings
November 13, 2025
What to Expect When You’re Expecting… a NERC CIP Audit (Part 1)
This is the first part of a two-part series that pulls back the curtains on NERC CIP audits, sharing what really happens...
Read more
Cybersecurity Musings
October 23, 2025
Empowering Electric Cooperatives: Overcoming Common Security Challenges
In the world of electricity generation and distribution, cooperatives and municipal utilities ensure power reaches communities...
Read more
Cybersecurity Musings
October 16, 2025
IT vs OT Cybersecurity: Why IT Best Practices Often Don’t Apply
Today, nearly everyone – and everything – is connected to the internet. Cybersecurity is frequently a regular part of...
Read more
Cybersecurity Musings
October 3, 2025
Establishing Visibility with OT Asset and Network Baselines
Operators, analysts, and OT practitioners all know that defending and improving the operations of an industrial environment...
Read more
Cybersecurity Musings
September 25, 2025
Enhancing OT Vulnerability Management with Visibility
Vulnerability management is crucial for ensuring safety, operations, compliance, and information security in operational...
Read more
Cybersecurity Musings
September 18, 2025
Detecting Threats and Anomalies in OT Environments: The Basics
When it comes to maintaining operations in critical infrastructure organizations, knowing what’s going on in your environment...
Read more
Cybersecurity Musings
September 3, 2025
The Basics Behind Building an Asset Inventory in OT Environments
Successfully implementing a project in your OT (operational technology) environment, whether it’s for security, operations,...
Read more
Cybersecurity Musings
August 28, 2025
The OSI Model for OT Visibility
The OSI (Open Systems Interconnection) model describes how different devices and systems communicate with each other. The...
Read more
Scroll to top