Reducing OT Incident Impact Inflation
Where does the media get the information and quotes that turn a couple of residential swimming pools of water spilling out of a water tank (Muleshoe) into a major story and congressional hearing ... from us, the OT security community. Since we are part of the problem,...
S4x26 Theme Keynote: Connect
Below is what I intended to say on stage. It always varies a little bit live. The video will be out next week. Each S4 Conference has a single word theme. This year's theme is Connect. Connections are exciting, unpredictable, scary, they bring opportunity, and for...
First Nozomi, Now Armis
2025 saw two of the four top tier OT detection + asset inventory vendors get acquired. First Mitsubishi Electronics acquired Nozomi Networks at a valuation of $950M (read my analysis of the Nozomi acquisition). Then last month ServiceNow announced they will be...
25 Years, 3 Lessons
I'm finishing my 25th year focused on OT security (called SCADA security when I started, then ICS security, and now OT security). So many failures, successes, changed analysis, and lessons learned over that time. Here are 3 lessons that I wish hadn't taken me so long...
Premature Consensus In OT Security Made Worse With AI
We know very little about what security controls and consequence reduction actions reduce the number and impact of incidents that includes an OT cyber component. Read that again. We have hypotheses. I have hypotheses, and wrote a book on the topic A Year In OT...
Two OT Security Debates
We've had some great debates on the S4 stage. One of my favorites was a debate I had with Eric Byres entitled Is Eric Byres a SCADA Apologist or a SCADA Realist?. The key to a good debate is to find an issue where a 10% - 25% minority of the audience has a strong...
Water Treatment Honeynet Incident Analysis
Forescout's Verdere Labs reported that a honeynet posing as a water treatment system was compromised by TwoNet, a Russian-aligned group. According to the blog entry TwoNet caused: Defacement: Login page changed to HACKED BY BARLATI, F*** Process Disruption: Deleted...
OT Is The Venice Of Security Infrastructure
I get tired of writing that 90%+ of the OT protocols used to communicate with PLC's and other Level 1 devices (and Level 0 ... hello Joe) are insecure by design. They lack cryptographic authentication of the source or contents, intentionally. They were designed to...
What Is The True Level Of OT Cyber Incidents?
This article attempts to frame the question after my back and forth with Robert M. Lee last Friday. Question: How many cyber attacks are resulting in non-trivial consequence events in OT / Operations? Stipulation 1: Ransomware and other causes of outages on IT cyber...
Disconnected: Manufacturing and OT Security
Last week I attended Inductive Automation's Ignition Community Conference (ICC). Primarily to get smarter on what's going on in bleeding edge manufacturing, but also to verify and understand why there is a disconnection between manufacturing automation / data...
GET DALE'S ICS SECURITY NEWS & NOTES EMAIL EVERY FRIDAY
Article Archive By Year
Article Archive By Category
UPCOMING EVENTS
CENTELEC ... 7 April 2026 in Galvaston, TX
More info coming soon.
S4x27 ... 8 - 11 February 2027 in Tampa
Save the date for S4x27. For the biggest and most future focused on ICS Security Event ... and now in our new and larger venue in Tampa.