Blog

Is It Time To Consider Data Diodes to Protect Your Plants?

Bayshore is pleased to announce the launch of its latest purpose-built OT security appliance, SCADAwall, an industrial airgap bridge. Like SCADAfuse and OTaccess, SCADAwall is designed to be easy for OT engineers and operators to set up and use, without requiring corporate IT resources, or the...

Learn More
The Significance of File Objects in IIoT/OT Security
"Many Cyber Security experts view file objects as purely elements in the IT space, but this is a dangerous oversight."- Andres Andreu, CTO of Bayshore Networks

Contrary to a common theme I have encountered in our industry, file objects (i.e. files) are a very relevant element in the ICS...

Learn More
OT Security: The Answers are within Your Data

In the evolution of the OT and IIoT, one of the most commonly overlooked areas within network security is: values in the data. Contextually, what I mean when I use the term: ”data” is, the data seen beyond network meta data (i.e. source address, source port, destination address, destination...

Learn More
Manufacturing Under Attack
"Targeted exploits with a bullseye on ICS environments will be the next big wave of attacks."- Andres Andreu, CTO of Bayshore Networks

Today’s manufacturing processes, for the most part, involve standardized, layered systems with in-depth production rules, guidelines and regulatory oversight....

Learn More
2018 ICS Security Predictions

We just closed another year in the ICS security industry, one filled with advanced (and exciting) product developments. We also saw an increased market awareness, with growing a emphasis on protecting industrial infrastructure.

Learn More
S4x18 Preview

The 11th annual S4 Conference will take place in Miami Beach from January 16th – January 18th! S4 is the largest, most advanced ICS security, OT and IIoT event of the year.

Learn More
Securing Energy: The Unique Security Challenges in Power Generation and Distribution Plants

Recent headlines have again raised the public awareness of cyber threats to critical infrastructure. Much has been written about the threat of CrashOveride or Industroyer malware that was used to take down power in the Ukraine. The US Department of Homeland Security, Computer Emergency Response...

Learn More
Protecting Your Industrial Infrastructure - Where to Start

The growing significance of industrial cyber protection is a consequence of several security breaches that could happen in a manufacturing environment. These include incidents such exfiltration of industrial data, unauthorized access to industrial control systems, and manipulation of industrial...

Learn More