Blog

Is It Time To Consider Data Diodes to Protect Your Plants?

Bayshore is pleased to announce the launch of its latest purpose-built OT security appliance, SCADAwall, an industrial airgap bridge. Like SCADAfuse and OTaccess, SCADAwall is designed to be easy for OT engineers and operators to set up and use, without requiring corporate IT resources, or the...

Learn More
The Significance of File Objects in IIoT/OT Security
"Many Cyber Security experts view file objects as purely elements in the IT space, but this is a dangerous oversight."- Andres Andreu, CTO of Bayshore Networks

Contrary to a common theme I have encountered in our industry, file objects (i.e. files) are a very relevant element in the ICS...

Learn More
OT Security: The Answers are within Your Data

In the evolution of the OT and IIoT, one of the most commonly overlooked areas within network security is: values in the data. Contextually, what I mean when I use the term: ”data” is, the data seen beyond network meta data (i.e. source address, source port, destination address, destination...

Learn More
Manufacturing Under Attack
"Targeted exploits with a bullseye on ICS environments will be the next big wave of attacks."- Andres Andreu, CTO of Bayshore Networks

Today’s manufacturing processes, for the most part, involve standardized, layered systems with in-depth production rules, guidelines and regulatory oversight....

Learn More
2018 ICS Security Predictions

We just closed another year in the ICS security industry, one filled with advanced (and exciting) product developments. We also saw an increased market awareness, with growing a emphasis on protecting industrial infrastructure.

Learn More
S4x18 Preview

The 11th annual S4 Conference will take place in Miami Beach from January 16th – January 18th! S4 is the largest, most advanced ICS security, OT and IIoT event of the year.

Learn More
ICS Cyber Security for ICS/OT: Where Do You Deploy It?

IT professionals and OT managers often ask us what is the best way to secure industrial machines and devices. And of course there are many cyber-protective technologies to work with.

But the question often comes down to the placement of the protective technology: “Should I put protection on the...

Learn More
AT&T Enterprise: Securing the Internet of Things

Bayshore Blog Post: AT&T Enterprise

March 2, 2016

Learn More