The OT and IoT Security Podcast
In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of encrypted OT/IoT systems. Nozomi Networks security researchers combine research with field expertise to drill into what is being done, using IEC 62351 as an example. They also cover two different attack scenarios, and the future of the threat detection landscape.