
Sign up to save your podcasts
Or


In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of encrypted OT/IoT systems. Nozomi Networks security researchers combine research with field expertise to drill into what is being done, using IEC 62351 as an example. They also cover two different attack scenarios, and the future of the threat detection landscape.
Visit Our Website
Follow Us on LinkedIn
By Nozomi Networks5
11 ratings
In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of encrypted OT/IoT systems. Nozomi Networks security researchers combine research with field expertise to drill into what is being done, using IEC 62351 as an example. They also cover two different attack scenarios, and the future of the threat detection landscape.
Visit Our Website
Follow Us on LinkedIn