
Sign up to save your podcasts
Or


A vendor fixes an alarm at 4 PM. At midnight, that same remote tunnel is used to push an unsafe setpoint. Different intent, identical path.
How does your network know the difference? Spoiler: It doesn't.
This is the synthesis. We connect the dots from the previous episodes, the Oldsmar attack and the break-glass dilemma, to deliver a final verdict: You cannot patch your way to safety. You have to design it. We explore how to move from abstract frameworks like IEC 62443 to a concrete "abuse-resistant" architecture.
Tune in to learn why the most critical firewall in your plant isn't a device, it’s a design philosophy.
By Antonio GonzálezA vendor fixes an alarm at 4 PM. At midnight, that same remote tunnel is used to push an unsafe setpoint. Different intent, identical path.
How does your network know the difference? Spoiler: It doesn't.
This is the synthesis. We connect the dots from the previous episodes, the Oldsmar attack and the break-glass dilemma, to deliver a final verdict: You cannot patch your way to safety. You have to design it. We explore how to move from abstract frameworks like IEC 62443 to a concrete "abuse-resistant" architecture.
Tune in to learn why the most critical firewall in your plant isn't a device, it’s a design philosophy.