Products
RAM²™ - Continuous OT cyber risk management
spOT™ - On demand OT cyber risk assessment
remOT™ - Secure remote access to operational assets
Solutions
Use Cases
Noise reduction - Reduce alert fatigue from IDS solutions
Improve OT network security posture
Bridge security and compliance gaps
Efficient offline cyber risks monitoring
Preventing ransomware and cyberattack
Industries
Energy
Machine Manufacturing
Cyber Consultants and Auditors
Maritime and Commercial Ports
Food and Beverage
Pulp and Paper
Pharmaceuticals
Automotive
Oil and Gas
Chemicals
OT Security Services
Company
About us
Company
OTORIO's Leadership
Careers
Media & Events
Press Release
News
Events
Resources
Partners
Partner Log-In
Partner Program
Become a Partner
Blog
en
English
German
Get a Demo
Industrial Cyber Security Blog
Home
>
Blog
Sierra Wireless AirVantage and AirLink Router Vulnerabilities
05 Jun 2023
Vulnerabilities in Sierra Wireless AirVantage cloud-based management platform and AirLink series of routers disclosed and mitigated.
Read More
Navigating Risks and Gains in Industry 4.0
24 May 2023
Interconnecting IoT and OT optimize efficiency, but the cybersecurity risks are high.
Read More
RCE on InHand Networks Cloud-Managed Routers
22 May 2023
Research discovers vulnerabilities in the cloud management platform, InRouter devices.
Read More
Teltonika Cloud Takeover Vulnerability Exposed
15 May 2023
Vulnerabilities in Teltonika's RMS and RUT model routers affect thousands of internet-connected devices worldwide.
Read More
Protect OT Using OTORIO Risk Mitigation Patent
07 May 2023
OTORIO's newly patented risk simulation model and attack graph analysis provide a unique approach to quantifying and managing risk.
Read More
Key Challenges and Priorities of OT Cyber Security 2023
19 Apr 2023
ServiceNow & OTORIO survey C-suite insights confirm rising concerns for OT security, and highlight key challenges and priorities for 2023/24.
Read More
Importance of Continuous OT Cybersecurity Assessment in a Changing World
21 Mar 2023
The need for robust OT security practices continues to grow as the threat landscape for IT-IoT-OT security continues to evolve.
Read More
Critical Infrastructure Security at the Center of New US National Cybersecurity Strategy
07 Mar 2023
Biden's new US cybersecurity strategy stresses the importance of working proactively and strategically to defend critical infrastructure.
Read More
OT Security a Year Into Russia's War Against Ukraine
28 Feb 2023
During the first four months of 2022, researchers identified more destructive malware attacks on Ukraine by Russia than in the previous eight years.
Read More
View All
Subscribe
Most Popular Posts
11 Jan 2022
A House of Cards: Shoring Up the OT Digital
more
02 Mar 2021
OTORIO’s Pen-Testers discovered more than 20 vulnerabilities in a popular Industrial Remote Access Solution
more
10 Feb 2021
Florida’s Water Poisoned by Hackers: A Warning Signal
more
Popular Tags
Vulnerability
(29)
Critical Infrastructure
(25)
Ransomware
(22)
Industrial Cyber-security
(18)
Energy
(13)
ICS Bulletin
(13)
Oil & Gas
(12)
Operational Networks
(8)
ICS
(8)
ot
(8)
Automotive
(7)
operational technology
(7)
Industry 4.0
(7)
Critical Control System Cybersecurity
(6)
OT security
(5)
Supply Chain Security
(5)
Threats
(5)
Guide
(5)
Industrial Security Strategy
(5)
GhostSec
(4)