Telnet in OT: The Risk Everyone Knows and Still Can’t Remove
The recent disclosure of CVE-2026-32746 once again brought Telnet into focus. Telnet is a legacy remote-access protocol that lets users connect to and manage systems over a network via a command-line interface. Unlike modern alternatives, it transmits data in...
How to Successfully Implement Password Management in OT/ICS
In the previous article, we discussed why password management continues to be one of the toughest cybersecurity challenges in Operational Technology (OT) and Industrial Control System (ICS) environments. Legacy systems, ongoing operations, vendor dependencies, and...
Why Is Password Management So Difficult in OT/ICS?
Password management is often viewed as one of the most fundamental cybersecurity controls. Strong passwords, rotation policies, and account management practices are among the initial security measures taught in most IT security frameworks. Why, after decades of...
Myth: Legacy OT Systems Are Too Old to Be Targeted
When many industrial operators hear about cyberattacks, their minds jump to high-tech targets, modern cloud platforms, corporate IT networks, and state-of-the-art control systems. The assumption often follows:"Our legacy OT systems are too old for hackers to care...
Managing Cybersecurity Risk in Large-Scale Cellular Modem Deployments for OT Networks
Cellular connectivity has quietly become one of the most common yet least understood components in modern OT environments. Utilities, oil and gas operators, manufacturers, and transportation providers are deploying hundreds or thousands of cellular modems to connect...
What Should We Call the ICS NSM Market?
Operational Technology (OT) and Industrial Control Systems (ICS) are critical to the infrastructure powering our modern lives, from electricity grids and water systems to manufacturing plants and transportation networks. As cyber threats targeting these systems...
Making Cybersecurity Operational
What is Operational Cybersecurity? In today’s increasingly digital world, cybersecurity is more critical than ever. As organizations embrace digital transformation and automation, they face heightened risks from sophisticated cyber threats that can compromise...
When Cybersecurity Stops the Assembly Line: Lessons from the Jaguar Land Rover Production Shutdown
In late August to early September of 2025, Jaguar Land Rover (JLR), Britain’s largest automotive employer, faced a decision that many organizations hope they never have to make. After detecting a cyber incident affecting its internal systems, JLR’s security and IT...
Myth: Antivirus and Firewalls Are Enough — The Dangerous Shortcut in Cybersecurity
When you think of basic cybersecurity, what comes to mind? For most people (and even many organizations), it starts and ends with installing an antivirus program and setting up a firewall. This traditional mindset has become so widespread that it feels like an...
Is OT Software-Defined Networking (SDN) a Real Thing or a Pipe Dream?
Software-Defined Networking (SDN) has been one of the most talked-about concepts in enterprise networking over the past decade. Promising centralized control, automation, and increased visibility, SDN is often positioned as a modern alternative to traditional,...
OT/ICS Penetration Tests Are Worth It (But Only If You’re Ready)
Penetration testing is often considered an essential tool for identifying vulnerabilities in IT environments. But when it comes to Operational Technology (OT) and Industrial Control Systems (ICS), penetration testing can be a double-edged sword. Many organizations...
Implementing API 1164 Cybersecurity Guidelines in the Pipeline Industry
In today's digital age, the pipeline industry faces increasing cybersecurity threats that can jeopardize operations, safety, and data integrity. To address these challenges, the American Petroleum Institute (API) introduced API 1164, a comprehensive cybersecurity...
If you are frustrated at wasted time and resources spent on security projects with nothing to show for it, or need your security or operations team to do more with less, give us a call at (469) 574-4000 or send a message to info@enaxy.com. Let’s see how we can help ensure your assets are secure.