Archive

IT security scanning tools operate by actively probing network devices for open ports, services, and vulnerabilities. In IT environments this is acceptable. In OT environments — where PLCs and DCS controllers are running continuous processes — unsolicited network traffic can cause unexpected behavior, communication timeouts,...