mirror of
https://github.com/0xor0ne/awesome-list.git
synced 2026-04-29 14:37:39 -05:00
Update list - 20220802
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
My personal awesome list of interesting repos, libraries and tools.
|
||||
|
||||
## Content
|
||||
# Content
|
||||
|
||||
* [Awesome Lists](#awesome-lists)
|
||||
* [Blogs ad Tutorials](#blogs-and-tutorials)
|
||||
@@ -26,6 +26,10 @@ My personal awesome list of interesting repos, libraries and tools.
|
||||
* [Tracing, Hooking and Instrumentation](#tracing-hooking-and-instrumentation)
|
||||
* [Trusted Execution Environment](#trusted-execution-environment)
|
||||
|
||||
# In-Depth Topics
|
||||
|
||||
* [OT/IoT Security](topics/ot_security.md)
|
||||
|
||||
## Awesome Lists
|
||||
|
||||
* [Analysis Tools (dynamic)][372]: curated list of dynamic analysis tools for all
|
||||
|
||||
116
topics/ot_security.md
Normal file
116
topics/ot_security.md
Normal file
@@ -0,0 +1,116 @@
|
||||
# OT/IoT/ICS Security
|
||||
|
||||
## Content
|
||||
|
||||
* [Companies](#companies)
|
||||
|
||||
## Companies
|
||||
|
||||
* [Applied Risk][41]: industrial cyber security.
|
||||
* [Resuorces][42]: Applied Risk library.
|
||||
* [Armis][25]: asset visibility.
|
||||
* [Blog][26]: Armis blog.
|
||||
* [BAE][37]: cyber defense company.
|
||||
* [Blog][38]: BAE blog.
|
||||
* [Bayshore][43]: Modular Industrial Cybersecurity Platform.
|
||||
* [Resuorces][44]: Bayshore resources.
|
||||
* [Claroty][3]: visibility, protection, and threat detection across all
|
||||
cyber-physical systems.
|
||||
* [Resource Library][4]: Claroty blog and resources.
|
||||
* [CyberArk][39]: unified platform to deliver on extensive compliance
|
||||
requirements for a wide range of regulations, frameworks & standards.
|
||||
* [Blog][40]: CyberArk blog.
|
||||
* [DarkTrace][21]: cloud-based OT security platform that uses self-learning
|
||||
artificial intelligence to cover entire networks, including IoT assets.
|
||||
* [Resources][22]: Darktrace library.
|
||||
* [Dragos][7]: OT visibility, detection and response.
|
||||
* [Resources][8]: Dragos blog and resources.
|
||||
* [ForcePoint][15]: cloud visibility security platform.
|
||||
* [Blog][16]: Forcepoint security insights.
|
||||
* [forescout][9]: automated cybersecurity across the digital terrain (IT, IoT,
|
||||
OT, and IoMT).
|
||||
* [Resouorces][10]: Forescout blog and knowledge base.
|
||||
* [Fortinet][35]: Various security solutions including OT.
|
||||
* [Blog][36]: Fortinet blog.
|
||||
* [Industrial Defender][11]: OT cybersecurity solutions.
|
||||
* [Blog][12]: OT cybersecurity news.
|
||||
* [Mission Secure][5]: OT network cyber risk assessment.
|
||||
* [Blog][6]: OT network articles from Mission Secure.
|
||||
* [Nozomi][1]: OT and IoT security and visibility.
|
||||
* [Labs blog][2]: Nozomi security research blog.
|
||||
* [Ordr][27]: single-platform solution for securing converged IT and OT
|
||||
environments.
|
||||
* [Resources][28]: Ordr library.
|
||||
* [Phosphorus][31]: IoT devices visibility.
|
||||
* [Resources][32]: Phosphorus cybersecurity news and insights.
|
||||
* [Radiflow][29]: OT risk management.
|
||||
* [Resources][30]: Radiflow resource center.
|
||||
* [SCADAfence][17]: OT and IoT security platform.
|
||||
* [Blog][18]: SCADAfence blog.
|
||||
* [Security Gate][13]: risk assessment, improvement and documentation platform.
|
||||
* [Blog][14]: Security Gate blog.
|
||||
* [SIGA][19]: visibility into IoT networks and IT devices using accurate
|
||||
real-time sensors.
|
||||
* [Blog][20]: SIGA blog.
|
||||
* [Tenable][23]: tenable.ot platform.
|
||||
* [Blog][24]: Tenable blog.
|
||||
* [Veracity][45]: SDN based industrial network platform.
|
||||
* [Blog][46]: Veracity blog.
|
||||
* [Verve][33]: OT/ICS security.
|
||||
* [Resources][34]: Verve resource library.
|
||||
* [Waterfall][47]: OT security monitoring.
|
||||
* [Blog][48]: Waterfall blog.
|
||||
* [Wiz Nucleus][49]: cyber and physical security.
|
||||
* [Blog][50]: Wiz Nucleus blog.
|
||||
|
||||
|
||||
[1]: https://www.nozominetworks.com/
|
||||
[2]: https://www.nozominetworks.com/labs/labs-blogs/
|
||||
[3]: https://claroty.com/
|
||||
[4]: https://claroty.com/resources
|
||||
[5]: https://www.missionsecure.com/
|
||||
[6]: https://www.missionsecure.com/blog
|
||||
[7]: https://www.dragos.com/
|
||||
[8]: https://www.dragos.com/resources/
|
||||
[9]: https://www.forescout.com/
|
||||
[10]: https://www.forescout.com/resources/
|
||||
[11]: https://www.industrialdefender.com/
|
||||
[12]: https://www.industrialdefender.com/ics-cybersecurity-blog/#
|
||||
[13]: https://securitygate.io/
|
||||
[14]: https://securitygate.io/blog/
|
||||
[15]: https://www.forcepoint.com/
|
||||
[16]: https://www.forcepoint.com/blog
|
||||
[17]: https://www.scadafence.com/
|
||||
[18]: https://blog.scadafence.com/
|
||||
[19]: https://sigasec.com/
|
||||
[20]: https://sigasec.com/blog/
|
||||
[21]: https://darktrace.com/
|
||||
[22]: https://darktrace.com/resources
|
||||
[23]: https://www.tenable.com/products/tenable-ot
|
||||
[24]: https://www.tenable.com/blog
|
||||
[25]: https://www.armis.com/
|
||||
[26]: https://www.armis.com/blog
|
||||
[27]: https://ordr.net/solutions/ot-security/
|
||||
[28]: https://resources.ordr.net/
|
||||
[29]: https://www.radiflow.com/
|
||||
[30]: https://www.radiflow.com/category/blog/
|
||||
[31]: https://phosphorus.io/
|
||||
[32]: https://phosphorus.io/resource-center/
|
||||
[33]: https://verveindustrial.com/
|
||||
[34]: https://verveindustrial.com/resources/
|
||||
[35]: https://www.fortinet.com/
|
||||
[36]: https://www.fortinet.com/blog
|
||||
[37]: https://www.baesystems.com/en/home
|
||||
[38]: https://www.baesystems.com/en/blogs
|
||||
[39]: https://www.cyberark.com/solutions/audit-compliance/
|
||||
[40]: https://www.cyberark.com/resources/all-blog-posts
|
||||
[41]: https://applied-risk.com/
|
||||
[42]: https://applied-risk.com/resources
|
||||
[43]: https://bayshorenetworks.com/Fortinet
|
||||
[44]: https://bayshorenetworks.com/resources/
|
||||
[45]: https://veracity.io/
|
||||
[46]: https://veracity.io/media-center/
|
||||
[47]: https://waterfall-security.com/
|
||||
[48]: https://waterfall-security.com/blog/
|
||||
[49]: https://www.wiznucleus.com/
|
||||
[50]: https://www.wiznucleus.com/blogs/
|
||||
Reference in New Issue
Block a user