Trending

#Enaxy

Latest posts tagged with #Enaxy on Bluesky

Latest Top
Trending

Posts tagged #Enaxy

Post image

OT/ICS penetration testing can uncover real vulnerabilities—but only if you’re ready for it.

Brandon Workentin explores what organizations should consider before bringing penetration testing into industrial environments.

enaxy.com/2026/03/ot-i...

#OTSecurity #ICS #Cybersecurity #Enaxy

0 0 0 0
Post image

Wrapping up our Industry-Specific Cybersecurity Standards series.

Juan Negrete looks at how pipeline operators can implement API 1164 in practice by turning cybersecurity guidance into operational improvements.

enaxy.com/2026/03/impl...

#OTSecurity #PipelineSecurity #API1164 #Enaxy

0 0 0 0
Post image

Another OT cybersecurity myth—busted.

“My small OT network won’t be targeted.”

In our latest post, Juan Negrete explains why size doesn’t determine risk and why underestimating threats can be costly.

Read 👉 enaxy.com/2026/02/myth...

#OTSecurity #ICS #Cybersecurity #Enaxy

0 0 0 0
Post image

Maritime operations rely on reliability and cybersecurity is now part of that equation.

Juan Negrete looks at BIMCO’s cybersecurity guidance and how it’s shaping security expectations across the maritime sector.

enaxy.com/2026/02/navi...

#MaritimeSecurity #OTSecurity #Cybersecurity #Enaxy

0 0 0 0
Post image

Cybersecurity standards outside of IT often reflect real-world operational and regulatory pressures.

In our latest post, we look at the TSA Security Directive, what it requires and how it shapes cyber risk decisions in critical infrastructure.

enaxy.com/2026/02/indu...

#OTSecurity #Enaxy

0 0 0 0
Post image

Cybersecurity standards aren’t one-size-fits-all.

We’re launching a new series on industry-specific cybersecurity standards, starting with energy. Brandon Workentin introduces NERC CIP and why it matters for the bulk electric system.

enaxy.com/2026/02/an-i...

#OTSecurity #Cybersecurity #Enaxy

0 0 0 0
Post image

New blog series: OT Cybersecurity Myths.

Each post takes on a common assumption about OT security and we’re starting with the myth that OT systems are “isolated” and immune to cyberattacks.

Intro: enaxy.com/2026/01/myth...

First myth: enaxy.com/2026/01/myth...

#OTSecurity #Enaxy

0 0 0 0
Post image

Is OT cybersecurity repeating mistakes IT already made?
As OT environments become more connected, familiar security patterns are emerging. Brandon Workentin looks at the parallels between IT and OT and what lessons teams should apply now.

enaxy.com/2026/01/is-o...

#OTSecurity #Cybersecurity #Enaxy

1 0 0 0
Post image

MQTT is becoming more common in OT environments, which makes securing it essential.

Juan Negrete breaks down how MQTT is used in OT and what teams should consider to protect critical systems as connectivity grows.

enaxy.com/2026/01/secu...

#OTSecurity #ICS #MQTT #IndustrialAutomation #Enaxy

1 0 0 0
Post image

Virtual PLCs are changing how industrial control systems are designed.

Kyle Byrum breaks down what virtual PLCs are, where they make sense, and the key reliability and security considerations for modern OT environments.

enaxy.com/2026/01/what...

#OTSecurity #ICS #IndustrialAutomation #PLCs #Enaxy

1 0 0 0
Post image

Is the CIA triad enough for OT/ICS cybersecurity?
In industrial environments, priorities often go beyond confidentiality.

Kyle Byrum looks at CIA vs. SRP (Safety, Reliability, Productivity) and what a different lens means for OT/ICS security decisions.

enaxy.com/2025/12/shou...

#OTSecurity #Enaxy

2 0 0 0
Post image

Wrapping up our Navigating Network Monitoring series.

In the final post, Juan Negrete shares real-world field case studies. What network visibility looks like with real constraints and operational priorities.

Read: enaxy.com/2025/12/navi...

#NetworkMonitoring #OTSecurity #Cybersecurity #Enaxy

2 0 0 0
Post image

New in our Navigating Network Monitoring series: Juan Negrete breaks down SPAN vs. TAP pros/cons + key trade-offs:
enaxy.com/2025/11/navi...

#Cybersecurity #NetworkMonitoring #OTSecurity #ICS #Enaxy

1 0 0 0
Post image

New in our monitoring series: SPAN vs. TAP in industrial environments.

Juan Negrete breaks down what works, what doesn’t, and how to choose the right fit for OT environments.

Read more: enaxy.com/2025/11/navi...

#OTSecurity #Cybersecurity #Enaxy

1 0 0 0
Post image

Canada’s cybersecurity maturity is at a crossroads.
Awareness is high, but execution gaps persist.

In our latest blog, Enaxy team member Kyle Byrum breaks down why, and how leaders can close the gap for 2025.

Read here: enaxy.com/2025/11/the-...

#Cybersecurity #Canada #CyberResilience #Enaxy

1 0 0 0
Post image

Our latest blog by Brandon Workentin explores how to build a “definitive view” of your OT architecture: why it matters, what’s strong, & how to apply it.

Visibility = Resilience.

Read here: enaxy.com/2025/10/new-...
#Cybersecurity #OTSecurity #ICS #CISA #OTArchitecture #Enaxy

3 0 0 0