Topic Hub · Protocols
Industrial protocols were designed for reliability under harsh conditions, not for the modern adversary. The articles below cover Modbus, DNP3, Profinet, EtherNet/IP, OPC-UA, IEC 61850, and the security implications of each.
Related service
ICS Penetration TestingProtocol-aware penetration testing across Modbus, DNP3, Profinet, EtherNet/IP, OPC-UA.
Field Reports & Research (18)
Field Report
Modbus remains widely deployed in industrial facilities despite security limitations. Understand Modbus architecture, risks
Read field report →
Field Report
Wireless networks introduce risk in OT, but specific use cases justify the tradeoff. Learn which wireless applications have clear security benefits.
Read field report →
Field Report
DNP3 is the standard protocol for utility SCADA systems. Learn DNP3 architecture, authentication extensions, and security best practices for power and
Read field report →
Field Report
Modbus TCP was designed for local networks and has no built-in authentication. Learn how to run it across segmented networks without compromise.
Read field report →
Field Report
SD-WAN enables cost-effective multi-site networks but introduces architectural complexity in OT. Learn how to maintain security and determinism across
Read field report →
Field Report
Firewall selection drives your segmentation strategy for years. Learn what features actually matter for OT versus vendor marketing fiction.
Read field report →
Field Report
Passive monitoring avoids disruption to production networks. We explain deployment strategies, traffic capture approaches, and the limitations of visi
Read field report →
Field Report
Unidirectional gateways enforce one-way data flow at the hardware level. They are powerful but expensive and operationally complex.
Read field report →
Field Report
Building Management Systems control critical data center infrastructure: power, cooling, access, and environmental systems.
Read field report →
Field Report
The ICS matrix gives plant teams a common vocabulary for attacker behavior. We walk through how to map it to real facilities without turning it into a
Read field report →
Field Report
Every OT security leader claims they have visibility into their industrial networks. Most do not.
Read field report →
Field Report
Private 5G networks promise deterministic connectivity for manufacturing. What security tradeoffs should you understand before deploying one?
Read field report →
Field Report
Surveillance NVRs and PTZ cameras have a long history of embedded vulnerabilities. In a facility with hundreds of devices, that
Read field report →
Field Report
Digital certificates secure OPC UA, TLS, and other modern ICS protocols. Implement certificate lifecycle management, PKI architecture
Read field report →
Field Report
Industrial historians store operational data for analysis and compliance. Design historian systems for high availability, recovery, and secure data ma
Read field report →
Field Report
A properly architected OT DMZ isolates corporate IT from operational systems while maintaining necessary data flow.
Read field report →
Field Report
Choosing between a combined security operations center and separate IT and OT teams has major implications for incident response and threat hunting.
Read field report →
Field Report
Most SOC 2 scopes stop at the corporate perimeter. For data centers and manufacturers, that leaves the most operationally consequential systems outsid
Read field report →
Need this expertise applied to your facility?