OT Security Showdown: Manufacturers vs. Critical Infrastructure – Who’s Really Responsible?
Critical infrastructure organizations are urged to prioritize secure by design operational technology (OT) products. By choosing security-focused manufacturers, firms can shift cybersecurity costs, reduce attack risks, and send a message: security isn’t an optional add-on—it’s a necessity! Manufacturers, time to up your game and make security your middle name!

Hot Take:
When it comes to critical infrastructure security, it seems like manufacturers have been partying like it’s 1999 – leaving OT owners to foot the bill. But now, the Five Eyes alliance and European partners are serving up a reality check: secure-by-design is in, and outdated tech is out. Time for manufacturers to step up their game and stop making ‘security’ a dirty word!
Key Points:
- The Five Eyes alliance and European partners issued a joint advisory urging critical infrastructure to prioritize secure-by-design OT products.
- Security costs have mostly fallen on OT owners, but manufacturers hold the power to enhance product security.
- OT owners are encouraged to make security-focused purchasing decisions to incentivize manufacturers.
- Guidance includes eliminating default passwords and implementing phishing-resistant MFA.
- The advisory pushes for detailed threat models and robust vulnerability management from manufacturers.
Already a member? Log in here