Topic Hub · Protocols

Industrial Protocol Security

Industrial protocols were designed for reliability under harsh conditions, not for the modern adversary. The articles below cover Modbus, DNP3, Profinet, EtherNet/IP, OPC-UA, IEC 61850, and the security implications of each.

Related service

ICS Penetration Testing

Protocol-aware penetration testing across Modbus, DNP3, Profinet, EtherNet/IP, OPC-UA.

Field Reports & Research (18)

Field Report

Modbus: The Good Parts and the Dangerous Parts

Modbus remains widely deployed in industrial facilities despite security limitations. Understand Modbus architecture, risks

Read field report →

Field Report

Wireless in OT: Three Use Cases That Make Sense

Wireless networks introduce risk in OT, but specific use cases justify the tradeoff. Learn which wireless applications have clear security benefits.

Read field report →

Field Report

DNP3 Security Considerations for Utilities

DNP3 is the standard protocol for utility SCADA systems. Learn DNP3 architecture, authentication extensions, and security best practices for power and

Read field report →

Field Report

Modbus Over TCP Done Safely

Modbus TCP was designed for local networks and has no built-in authentication. Learn how to run it across segmented networks without compromise.

Read field report →

Field Report

Multi-Site OT Networks Over SD-WAN

SD-WAN enables cost-effective multi-site networks but introduces architectural complexity in OT. Learn how to maintain security and determinism across

Read field report →

Field Report

Choosing an OT Firewall: What Matters and What Doesn't

Firewall selection drives your segmentation strategy for years. Learn what features actually matter for OT versus vendor marketing fiction.

Read field report →

Field Report

Passive Network Monitoring for Industrial Environments: Deployment and Challenges

Passive monitoring avoids disruption to production networks. We explain deployment strategies, traffic capture approaches, and the limitations of visi

Read field report →

Field Report

Unidirectional Gateways: When You Actually Need One

Unidirectional gateways enforce one-way data flow at the hardware level. They are powerful but expensive and operationally complex.

Read field report →

Field Report

Data Center BMS Deep Dive

Building Management Systems control critical data center infrastructure: power, cooling, access, and environmental systems.

Read field report →

Field Report

Using MITRE ATT&CK for ICS to Structure Your OT Threat Model

The ICS matrix gives plant teams a common vocabulary for attacker behavior. We walk through how to map it to real facilities without turning it into a

Read field report →

Field Report

What OT Visibility Actually Means—And Why You Don't Have It Yet

Every OT security leader claims they have visibility into their industrial networks. Most do not.

Read field report →

Field Report

Private 5G for Industry: A Security Lens

Private 5G networks promise deterministic connectivity for manufacturing. What security tradeoffs should you understand before deploying one?

Read field report →

Field Report

Your Camera System Is an IoT Network. Treat It That Way.

Surveillance NVRs and PTZ cameras have a long history of embedded vulnerabilities. In a facility with hundreds of devices, that

Read field report →

Field Report

Certificate Management for ICS Environments

Digital certificates secure OPC UA, TLS, and other modern ICS protocols. Implement certificate lifecycle management, PKI architecture

Read field report →

Field Report

Historian Architecture Patterns for Resilience

Industrial historians store operational data for analysis and compliance. Design historian systems for high availability, recovery, and secure data ma

Read field report →

Field Report

Designing an Industrial DMZ That Actually Works

A properly architected OT DMZ isolates corporate IT from operational systems while maintaining necessary data flow.

Read field report →

Field Report

IT/OT SOC Models: Integrated vs Federated—What Fits Your Org

Choosing between a combined security operations center and separate IT and OT teams has major implications for incident response and threat hunting.

Read field report →

Field Report

Your SOC 2 Report Is Silent on OT. That's a Problem.

Most SOC 2 scopes stop at the corporate perimeter. For data centers and manufacturers, that leaves the most operationally consequential systems outsid

Read field report →

Need this expertise applied to your facility?

Tell us about your facility. We'll reply with a scoping framework within one business day.

Request scoping conversation