When determining which cryptographic protocols should be used to secure critical infrastructure, security professionals may be tempted to reach into the same toolbox used in IT. But is this the best choice? In this video, Senior Research Engineer Colin Gordon describes why we should carefully consider which cryptographic tools we use in critical infrastructure environments. He also shares advice for evaluating cryptographic tools.
Additional Posts by Contributor
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.
Learn why security techniques commonly used in IT may be unsuitable for application in critical energy systems.
Learn about tools the energy sector needs to identify and define emerging technologies and the impact they may have on cybersecurity.
Learn how the CIA triad informs how to apply cryptography to operational technology (OT) networks.