Posts

Showing posts from June, 2020

What is OT Security?

Image
A non-theoretical explanation of OT Security. In our normal Cyber Security practices, OT Security is an unusual keyword. Be it LinkedIn or Job portals the search results fetched using OT Security are mere small compared to other Cyber Security keywords. But in the practical world, OT is the most important term and line of service for any industry. If you look at the image the orange portion is the IT network. This IT network grabs most of the cybersecurity budget of an organization. We design secure networks, deploy firewalls, write ACL rules, and implement SIEM solutions to protect the IT infrastructure. Why? Because of inherent ideas, we assume systems that are connected to the internet and visible as a desktop or laptop are the attack surface of a cyber adversary. But if the revenue generation is taken under consideration then it can be observed that these systems are only supporting elements of operations, finance, sales, etc. Obviously, these are very important com...

Foreword

Image
Being associated with the security community for years, I understand the value of sharing. On the journey from being an engineering graduate to working in the security industry, my learning was dependent on the knowledge shared by other security engineers/community.  Now it's my duty to share whatever I learnt during my journey so far. My sole intention will be to enrich the security thought process and define new approach areas. I hope it will be enjoyable and informative at the same time. My writeups might not be streamlined to a particular topic but I will genuinely try to make them as explanatory as possible. Suggestions are always welcome. Pardon if any of my writeups seem to be written from a wrong understanding. I will love to hear my mistakes and try to correct them.