Resources

Research, field notes, and reference material for the people defending industrial systems.

Everything we publish comes directly from engagements with data centers, manufacturers, and critical infrastructure operators across the Pacific Northwest. No recycled vendor talking points.

Featured

Whitepaper
Whitepaper 18 min read

The Service-First Model for Industrial Cybersecurity

Why consulting-led programs outperform platform-led programs in operational environments — and how to evaluate providers against tangible resilience outcomes rather than dashboard screenshots.

Read the Paper By the Cascadia OT Security practice

Thesis

Service beats software for mid-market OT programs.

For

VPs of Operations, Plant Managers, Data Center Directors, IT Security Leads evaluating OT investment.

Covers

Platform vs service · Operator-led program design · Outcome metrics · Provider evaluation framework · Pacific Northwest context

Full Library

Browse everything we've published.

Whitepaper

The Service-First Model for Industrial Cybersecurity

Why consulting-led programs outperform platform-led programs in operational environments — and how to evaluate providers against tangible outcomes rather than dashboard screenshots.

Feb 2026 Cascadia OT Security
Scenario Playbook

Ransomware Into a Food Manufacturer's Historian: A Scenario Playbook

How we would walk a mid-sized food processor from initial detection through 9-day production recovery after a ransomware event that pivots from IT into OT historian servers — and the architecture that prevents recurrence.

Illustrative Cascadia OT Security
Scenario Playbook

Segmenting a Hyperscale BMS From the Corporate Network: A Scenario Playbook

A 14-week reference plan for moving a hyperscale Building Management System off a flat corporate network onto a segmented, monitored OT enclave — without interrupting critical cooling, power, or life-safety signals.

Illustrative Cascadia OT Security
Blog

The Air-Gap Myth and What to Do About It

Most manufacturing facilities believe they have air-gapped networks when they actually have networks that are segmented but not isolated. The distinction matters for risk modeling.

Apr 2026 Cascadia OT Security
Blog

Backup Strategies That Actually Survive Ransomware

Backups that don't survive ransomware aren't backups—they're liability. Learn what industrial organizations need to do differently.

Apr 2026 Cascadia OT Security
Blog

Your BMS Is Part of Your Attack Surface. Act Like It.

Building management systems — chillers, ATSes, CRACs, lighting — routinely sit on flat networks with default credentials and vendor-remote access. In a data center, that is a production risk.

Apr 2026 Cascadia OT Security
Blog

CCTV Analytics for Industrial Operations

AI-powered video analytics detect anomalies in industrial environments: unauthorized access, equipment tampering, unsafe conditions. Integrate CCTV intelligence into your security operations.

Apr 2026 Cascadia OT Security
Blog

The First 90 Minutes: OT Incident Response

Critical decisions in the first hours of an OT incident determine business continuity. Learn our triage framework for industrial environments.

Apr 2026 Cascadia OT Security
Blog

HMI Hardening: A Practical Guide

Human-Machine Interfaces are operational windows into critical systems. Implement HMI hardening: authentication, network segmentation, and secure remote access controls.

Apr 2026 Cascadia OT Security
Blog

Hydropower Generation Controls: PNW Specifics

Pacific Northwest hydropower facilities are critical infrastructure. Secure hydropower SCADA systems and dam operations from evolving cyber and physical threats.

Apr 2026 Cascadia OT Security
Blog

Initial Access Trends in OT: Email, Devices, and Supply Chain

We analyzed 2025 breaches targeting industrial facilities. Email phishing remains dominant, but supply chain and USB attacks are rising. Detailed findings inside.

Apr 2026 Cascadia OT Security
Blog

IT/OT Convergence Is Not a Strategy. It's a Risk Surface.

The word "convergence" has quietly become an excuse to skip the difficult architectural decisions that keep production floors running. Here's what responsible integration actually looks like.

Apr 2026 Cascadia OT Security
Blog

Mantrap Design for Data Centers

Effective mantrap architecture prevents unauthorized access while maintaining operational flow. Learn mantrap principles, dimensions, and deployment strategies for critical infrastructure protection.

Apr 2026 Cascadia OT Security
Blog

OT-Specific SIEM Rules That Actually Fire: Building Detections That Work

Generic SIEM rules fail in OT environments. We outline practical detection logic designed specifically for control system behavior and baselines.

Apr 2026 Cascadia OT Security
Blog

Why the Purdue Model Still Matters in 2026

Despite claims that cloud-connected OT has "killed" Purdue, the model's logical zones remain the clearest language we have for discussing industrial segmentation with auditors and operators.

Apr 2026 Cascadia OT Security
Blog

Ransomware Groups Currently Targeting Manufacturing

Active threat actors are refocusing on industrial targets. We break down which groups matter, what they exploit, and how to detect early indicators.

Apr 2026 Cascadia OT Security
Blog

Rogue Firmware: A Real Threat in a Slow-Patch World

Attackers can inject malicious firmware into control devices, creating persistence that survives reboots and factory resets. We explain the threat and detection approaches.

Apr 2026 Cascadia OT Security
Blog

Semiconductor Fab OT Security

Semiconductor fabrication requires extreme process control and capital equipment security. Address fab-specific OT challenges: equipment purveyors, process criticality, and supply chain risks.

Apr 2026 Cascadia OT Security
Blog

Threat Hunting in Industrial Networks: Methodology, Tools, and Early Wins

Threat hunting is proactive investigation for attacks your automated tools might miss. We explain hunting methodology adapted for OT environments and realistic outcomes.

Apr 2026 Cascadia OT Security
Blog

Time Synchronization: The Security Topic Nobody Talks About

Accurate time is foundational to OT security. Without it, forensics become impossible, compliance audits fail, and security controls malfunction.

Apr 2026 Cascadia OT Security
Blog

VLAN-Only Segmentation Is Not Enough

VLANs are network routing isolation, not security boundaries. Why VLAN-only segmentation fails in manufacturing and what you need instead.

Apr 2026 Cascadia OT Security
Blog

Certificate Management for ICS Environments

Digital certificates secure OPC UA, TLS, and other modern ICS protocols. Implement certificate lifecycle management, PKI architecture, and operational procedures.

Mar 2026 Cascadia OT Security
Blog

Choosing an OT Firewall: What Matters and What Doesn't

Firewall selection drives your segmentation strategy for years. Learn what features actually matter for OT versus vendor marketing fiction.

Mar 2026 Cascadia OT Security
Blog

Drone Reconnaissance at Industrial Sites: Threat Assessment and Detection

Unmanned aircraft provide attackers with aerial surveillance of facilities. We examine the threat and how to detect reconnaissance drones before mapping becomes attack planning.

Mar 2026 Cascadia OT Security
Blog

Endpoint Detection and Response on Engineering Workstations: Balancing Security and Usability

Engineering workstations bridge IT and OT networks. EDR tools can detect compromise, but must be tuned carefully to avoid false positives that make engineers disable them.

Mar 2026 Cascadia OT Security
Blog

Food and Beverage CIP Systems Security

Clean-in-Place systems are critical to food and beverage operations. Secure CIP systems against process tampering and unauthorized control.

Mar 2026 Cascadia OT Security
Blog

IEC 62443 in Plain English: What Operators Actually Need to Know

The 62443 family is sprawling. We cut it down to the zones, conduits, and security levels that most heavy manufacturers will actually be audited on.

Mar 2026 Cascadia OT Security
Blog

Key Management in Industrial Settings

Physical key management is often neglected in favor of electronic access. Implement proper key control procedures, auditing, and emergency protocols for industrial operations.

Mar 2026 Cascadia OT Security
Blog

Multi-Site OT Networks Over SD-WAN

SD-WAN enables cost-effective multi-site networks but introduces architectural complexity in OT. Learn how to maintain security and determinism across distributed sites.

Mar 2026 Cascadia OT Security
Blog

NERC CIP for Smaller Utilities and Co-Ops: Breaking Down the Burden

Many smaller utilities think NERC CIP doesn't apply to them. We clarify applicability, outline compliance requirements, and explain practical approaches.

Mar 2026 Cascadia OT Security
Blog

Post-Incident Forensics on a PLC

Extracting forensic artifacts from industrial controllers after a breach requires hardware-level understanding. We explain the constraints and techniques.

Mar 2026 Cascadia OT Security
Blog

Running Ransomware Drills on the Factory Floor

Tabletop exercises miss the muscle memory that matters. Here's how we structure live, low-risk ransomware drills for plant managers and maintenance teams.

Mar 2026 Cascadia OT Security
Blog

The RFID Badges in Your Pocket Are Probably Cloneable

HID Prox and low-frequency 125 kHz credentials still secure critical mechanical spaces at an uncomfortable number of facilities. A 40-dollar reader says hello.

Mar 2026 Cascadia OT Security
Blog

Your SOC 2 Report Is Silent on OT. That's a Problem.

Most SOC 2 scopes stop at the corporate perimeter. For data centers and manufacturers, that leaves the most operationally consequential systems outside the audit boundary.

Mar 2026 Cascadia OT Security
Blog

TRITON and the Safety System Problem

TRITON proved that attackers can weaponize safety systems. Seven years later, most industrial facilities still lack real-time safety system monitoring.

Mar 2026 Cascadia OT Security
Blog

Unidirectional Gateways: When You Actually Need One

Unidirectional gateways enforce one-way data flow at the hardware level. They are powerful but expensive and operationally complex. Learn when they are justified.

Mar 2026 Cascadia OT Security
Blog

Visitor Management at Manufacturing Plants

Effective visitor management balances safety, compliance, and operational continuity. Discover processes for credential verification, escort protocols, and background checks in manufacturing.

Mar 2026 Cascadia OT Security
Blog

Wiper Malware and the Industrial Sector: Threat, Impact, and Defense

Wiper malware erases data and disables systems. We examine recent industrial variants and explain how defenders detect them before they execute.

Mar 2026 Cascadia OT Security
Blog

Zone-and-Conduit Documentation That Actually Helps

Zone-and-conduit diagrams are essential for understanding OT architecture. Learn documentation formats that stay accurate and usable over time.

Mar 2026 Cascadia OT Security
Blog

Batch vs Continuous Processes: Different Security Postures

Batch and continuous manufacturing have different operational and security profiles. Design process-specific security controls and monitoring strategies.

Feb 2026 Cascadia OT Security
Blog

Your Camera System Is an IoT Network. Treat It That Way.

Surveillance NVRs and PTZ cameras have a long history of embedded vulnerabilities. In a facility with hundreds of devices, that's a substantial unmanaged footprint.

Feb 2026 Cascadia OT Security
Blog

Industroyer to Pipedream: A Decade of OT Malware Evolution

From Industroyer's breaker operations to Pipedream's modular architecture, we trace the evolution of OT-specific malware and what each generation taught attackers.

Feb 2026 Cascadia OT Security
Blog

Industrial Firewall Rule Hygiene

Firewall rules accumulate technical debt. A rules base that was clean becomes overgrown, redundant, and unmaintainable. Learn to keep rules clean.

Feb 2026 Cascadia OT Security
Blog

Micro-Segmentation in Manufacturing: When It's Worth It

Micro-segmentation—isolating individual devices or small groups—sounds appealing but requires sophisticated visibility and automation. Know when it delivers ROI and when it overcomplicates operations.

Feb 2026 Cascadia OT Security
Blog

Using MITRE ATT&CK for ICS to Structure Your OT Threat Model

The ICS matrix gives plant teams a common vocabulary for attacker behavior. We walk through how to map it to real facilities without turning it into a paperwork exercise.

Feb 2026 Cascadia OT Security
Blog

Modbus: The Good Parts and the Dangerous Parts

Modbus remains widely deployed in industrial facilities despite security limitations. Understand Modbus architecture, risks, and practical hardening strategies for OT networks.

Feb 2026 Cascadia OT Security
Blog

Nation-State Activity in US Industrial: What Is Public and What You Should Know

CISA and NSA have disclosed sophisticated state-sponsored attacks on US industrial targets. We summarize what is known and what the patterns tell us about targeting.

Feb 2026 Cascadia OT Security
Blog

OT Remote Sites: SD-WAN Patterns Worth Copying

Remote production sites and branch plants need cost-effective connectivity with security parity to headquarters. SD-WAN enables this if you design architecture carefully.

Feb 2026 Cascadia OT Security
Blog

OT-Aware SOAR Playbooks: Automating IR Without Breaking Things

Security orchestration in OT requires a different approach than IT. Learn how to build SOAR playbooks that respect OT constraints and safety requirements.

Feb 2026 Cascadia OT Security
Blog

How We Pen Test OT Without Breaking Production

Traditional red-team tooling will crash PLCs. Our methodology layers passive reconnaissance, controlled active testing in test cells, and carefully staged Level-3 exercises.

Feb 2026 Cascadia OT Security
Blog

Private 5G for Industry: A Security Lens

Private 5G networks promise deterministic connectivity for manufacturing. What security tradeoffs should you understand before deploying one?

Feb 2026 Cascadia OT Security
Blog

Protocol Anomaly Detection Without False Positive Fatigue

Detecting control protocol anomalies is powerful but noisy. We explain baselining approaches and behavioral detection methods that scale without overwhelming analysts.

Feb 2026 Cascadia OT Security
Blog

Pulp and Paper DCS Modernization

Pulp and paper manufacturing relies on Distributed Control Systems for process optimization. Navigate DCS modernization while maintaining security and operational continuity.

Feb 2026 Cascadia OT Security
Blog

Social Engineering in Plant Environments: The Human Attack Vector

Technical security is necessary but insufficient. Social engineering exploits legitimate trust and access norms. We outline common plant-specific tactics and defenses.

Feb 2026 Cascadia OT Security
Blog

Tailgating Detection: Tech vs Training

Prevent unauthorized access through mantrap doors and access points. Compare tailgating detection methods from passive observation to sensor-based alerts.

Feb 2026 Cascadia OT Security
Blog

TSA Pipeline Security Directives: What They Mean for Your Operations

TSA security directives for pipeline systems have evolved significantly. We explain current requirements and what compliance looks like in practice.

Feb 2026 Cascadia OT Security
Blog

Vendor Remote Access Is the Backdoor You Forgot You Have

Integrators, OEMs, and equipment vendors need to reach your plant. The way most facilities grant that access would fail a basic security review — and often does.

Feb 2026 Cascadia OT Security
Blog

Cellular Modems on the Plant Floor: The Hidden Attack Surface

Industrial cellular modems are everywhere—backup WAN links, remote site connectivity, emergency notifications. Few facilities understand their security implications.

Jan 2026 Cascadia OT Security
Blog

Cold Storage Logistics: The Ammonia Problem

Industrial refrigeration systems use ammonia for efficiency and cost. Understand ammonia safety, process control, and OT security in cold storage operations.

Jan 2026 Cascadia OT Security
Blog

Cryptomining on Plant Networks: Detection and Economic Impact

Cryptominers compromise industrial networks for computing power. We explain how to detect them and quantify the operational and security costs.

Jan 2026 Cascadia OT Security
Blog

Data Center BMS Deep Dive

Building Management Systems control critical data center infrastructure: power, cooling, access, and environmental systems. Secure BMS design and operations are essential.

Jan 2026 Cascadia OT Security
Blog

DNP3 Security Considerations for Utilities

DNP3 is the standard protocol for utility SCADA systems. Learn DNP3 architecture, authentication extensions, and security best practices for power and water utilities.

Jan 2026 Cascadia OT Security
Blog

Edge Computing for Manufacturing: Security Implications

Edge computing nodes bring compute capability closer to production systems. Learn how to secure edge infrastructure without creating security sprawl.

Jan 2026 Cascadia OT Security
Blog

EPA Water Sector Guidance: A Plain English Summary

The EPA has issued extensive cybersecurity guidance for water utilities. We break down the key expectations and practical implications.

Jan 2026 Cascadia OT Security
Blog

Flat OT Network to Purdue-Aligned in 90 Days: A Migration Playbook

Most legacy OT networks are flat. Converting to zone-based segmentation requires careful sequencing to avoid production downtime. Here's how we do it in practice.

Jan 2026 Cascadia OT Security
Blog

Loading Dock Security: An Overlooked Risk

Loading docks present unique security challenges: high personnel traffic, vehicle access, and limited visibility. Establish dock security protocols for manufacturing and data center operations.

Jan 2026 Cascadia OT Security
Blog

Living Off the Land in OT Environments

Attackers increasingly abuse legitimate OT tools for lateral movement and reconnaissance. We show what to monitor and how to defend.

Jan 2026 Cascadia OT Security
Blog

Modbus Over TCP Done Safely

Modbus TCP was designed for local networks and has no built-in authentication. Learn how to run it across segmented networks without compromise.

Jan 2026 Cascadia OT Security
Blog

What OT Visibility Actually Means—And Why You Don't Have It Yet

Visibility in OT isn't what IT teams expect. True visibility requires sensing at Purdue Levels 1–3, understanding process context, and bridging air gaps.

Jan 2026 Cascadia OT Security
Blog

Passive Network Monitoring for Industrial Environments: Deployment and Challenges

Passive monitoring avoids disruption to production networks. We explain deployment strategies, traffic capture approaches, and the limitations of visibility.

Jan 2026 Cascadia OT Security
Blog

Physical Drops: USB, Rubber Ducky, and Modern Descendants

Attackers leave infected USB devices at facility gates and in common areas, relying on social engineering and curiosity. We explain the evolving tactics and defenses.

Jan 2026 Cascadia OT Security
Blog

Pacific Northwest Facilities Run on Hydropower. That Matters for Resilience.

BPA, PGE, PacifiCorp — the grid geography shaping the PNW's industrial base creates specific resilience considerations most national playbooks don't account for.

Jan 2026 Cascadia OT Security
Blog

Colocation Tenant Security Boundaries

Multi-tenant colocation requires strict security boundaries between tenants. Implement physical separation, access control, and monitoring that protect tenant data and prevent cross-tenant attacks.

Dec 2025 Cascadia OT Security
Blog

When Commodity Malware Reaches OT: Collateral Damage and Cascading Failures

Malware designed for IT systems sometimes affects OT networks, causing unexpected impacts. We examine propagation mechanisms and defensive strategies.

Dec 2025 Cascadia OT Security
Blog

Designing an Industrial DMZ That Actually Works

A properly architected OT DMZ isolates corporate IT from operational systems while maintaining necessary data flow. Learn the zone design principles that work in real manufacturing environments.

Dec 2025 Cascadia OT Security
Blog

Supply Chain Attacks Against Your Integrator

When attackers compromise your systems integrator, your facility becomes a target. We explain the risk and how to defend against transitively compromised vendors.

Dec 2025 Cascadia OT Security
Blog

NIS2 Implications for US Industrial Subsidiaries

European NIS2 regulation affects US-based subsidiaries and suppliers. We explain how and what compliance requires.

Dec 2025 Cascadia OT Security
Blog

North-South vs East-West Traffic in OT

Network segmentation focuses on limiting east-west (lateral) movement. Understanding traffic patterns drives your segmentation strategy.

Dec 2025 Cascadia OT Security
Blog

OPC UA and Authentication Done Right

OPC UA is the modern standard for industrial data exchange. Master OPC UA authentication mechanisms: certificate-based trust, user authentication, and role-based access control.

Dec 2025 Cascadia OT Security
Blog

OT in the Cloud: Realistic Patterns and Anti-Patterns

Cloud infrastructure is becoming part of manufacturing architecture. Learn which OT workloads belong in the cloud and which should stay on-premises.

Dec 2025 Cascadia OT Security
Blog

Building an OT Runbook Library That Teams Actually Use

Runbooks are essential for OT incident response, but most organizations build them and ignore them. Learn how to create runbooks your team will follow.

Dec 2025 Cascadia OT Security
Blog

Perimeter Fencing: A Risk Posture Conversation

Perimeter fencing deters casual intrusion and defines security boundaries. Explore fencing types, height standards, and integration with access control systems.

Dec 2025 Cascadia OT Security
Blog

Portland and Hillsboro Data Center Cluster

The Portland-Hillsboro area hosts a significant cluster of data centers. Understand the market, shared infrastructure risks, and competitive security landscape.

Dec 2025 Cascadia OT Security
Blog

Targeted Phishing Against Process Engineers and Control System Specialists

Spear-phishing attacks against engineering staff have become highly personalized. We break down the tactics and how to train your team to recognize them.

Dec 2025 Cascadia OT Security
Blog

Wireless in OT: Three Use Cases That Make Sense

Wireless networks introduce risk in OT, but specific use cases justify the tradeoff. Learn which wireless applications have clear security benefits.

Dec 2025 Cascadia OT Security
Blog

CIRCIA Reporting: What to Prepare Now

The CISA Industrial Control Systems Cyber Incident Analysis Act requires incident reporting. Learn what criteria apply and how to prepare.

Nov 2025 Cascadia OT Security
Blog

Deterministic Networking for Control Traffic

Hard real-time control requires guaranteed latency and bandwidth. Learn when deterministic networking is worth the complexity and how to achieve it.

Nov 2025 Cascadia OT Security
Blog

Historian Architecture Patterns for Resilience

Industrial historians store operational data for analysis and compliance. Design historian systems for high availability, recovery, and secure data management.

Nov 2025 Cascadia OT Security
Blog

Hardening Industrial Switches: A Practical Checklist

Network switches are foundational to segmentation but often run with default credentials and dangerous access controls. Here is a hardening approach for manufacturing environments.

Nov 2025 Cascadia OT Security
Blog

Insider Threats in Control Rooms: Detection and Response

Malicious insiders have knowledge and access that external attackers must earn through weeks of reconnaissance. We outline detection strategies and the human factors that matter.

Nov 2025 Cascadia OT Security
Blog

IT/OT SOC Models: Integrated vs Federated—What Fits Your Org

Choosing between a combined security operations center and separate IT and OT teams has major implications for incident response and threat hunting.

Nov 2025 Cascadia OT Security
Blog

Rebuilding an OT Network Without Downtime

Replacing or significantly upgrading OT infrastructure while keeping production running requires parallel systems, careful sequencing, and fallback plans at every step.

Nov 2025 Cascadia OT Security
Blog

USB-Borne OT Malware: The Problem That Will Not Die

USB devices remain a primary infection vector for isolated OT networks. Despite twenty years of known risk, most facilities lack USB controls. We explain why and how to defend.

Nov 2025 Cascadia OT Security
Blog

SEC Cyber Disclosure Rules and Industrial Operations

The SEC's new disclosure rules require public companies to report material cybersecurity incidents. We explain the implications for industrial operators.

Oct 2025 Cascadia OT Security
Blog

NIST SP 800-82 Revision 3: What Changed and Why It Matters

NIST's guidance on industrial control system security was updated. We break down key changes and what they mean for your security program.

Sep 2025 Cascadia OT Security
Blog

CISA ICS Advisories: How to Triage and Respond

CISA releases hundreds of ICS advisories annually. We explain how to prioritize, assess applicability, and respond effectively.

Aug 2025 Cascadia OT Security
Blog

Insurance Underwriting for OT: What Carriers Actually Ask

Industrial organizations seeking cyber insurance are increasingly asked about OT security. We explain what underwriters look for and how to prepare.

Jul 2025 Cascadia OT Security
Blog

ISA/IEC 62443-2-4: Holding OT Integrators Accountable

The 62443 standard requires system integrators to meet specific security competencies. We explain the framework and its implications for vendor management.

Jun 2025 Cascadia OT Security
Blog

Building an OT Cybersecurity Program From Zero

Starting a cybersecurity program where none existed is daunting. We provide a phased approach that builds capability without overwhelming your team.

May 2025 Cascadia OT Security
Blog

Measuring OT Cyber Program Maturity: Metrics That Matter

How do you know if your OT cybersecurity program is actually improving? We explain metrics that reflect security progress.

Apr 2025 Cascadia OT Security
Blog

Vendor Risk Assessment for OT Integrators: What to Evaluate

Selecting and managing integrators who design and maintain your control systems requires evaluating security maturity. We explain how to assess and monitor vendors.

Mar 2025 Cascadia OT Security
Blog

M&A Due Diligence for Industrial Targets: What Cyber Looks Like

Acquiring or being acquired? Cybersecurity due diligence for industrial operations is complex. We explain what to evaluate and how to assess OT cyber risk.

Feb 2025 Cascadia OT Security
Blog

Budgeting OT Security: A Framework for Investment Decisions

OT security requires sustained investment. We provide a budgeting framework that helps prioritize spending and justify investments to finance and leadership.

Jan 2025 Cascadia OT Security

Stay Current

New field reports. Sent only when we publish something worth your time.

Roughly one message a month. No product promotions, no third-party sharing, unsubscribe in a click.

Field reports · research briefs · case notes