Skip to main content
Frontline Perspective

Our perspective for protecting civilization from cyber threats

When the world needs help protecting critical infrastructure, they trust the experts who have been on the frontlines of the world’s most significant cybersecurity attacks. But saving the world from adversaries isn’t a one-person job. That’s why we want to empower you to take charge of your operational technology (OT) environments with resources produced by our top experts — our perspective for protecting modern civilization from industrial cyber threats.

The world trusts our frontline perspective.

We take pride in being the first team called when there is a new threat. Now it’s your turn.

Explore our many resources below that can help you on your ICS cybersecurity journey.
Blog
The latest perspectives from our ICS experts.
READ BLOG
Blog
The Shifting Landscape of OT Incident Response
Calendar Icon
Blog
Targeting Operational Technology: The Hacktivist’s Path to Public Attention and…
Calendar Icon
Blog
Modern Operational Technology (OT) Components, Systems, Network Architectures and the…
Calendar Icon
Blog
Operationalizing Cyber Threat Intelligence (CTI): Key Components to Consider
Calendar Icon
Blog
What Is OT Cybersecurity and How Does It Differ from IT Cybersecurity? 
Calendar Icon
Blog
The Hunt: Detecting VOLTZITE Threat Group Activity in Critical Infrastructure 
Calendar Icon
Whitepapers
Key takeaways from the ICS cybersecurity experts.
READ WHITEPAPERS
Whitepapers
Strengthening Industrial Cyber Defense with MITRE ATT&CK for ICS and Threat…
Whitepapers
How To Prepare For & Respond to Ransomware In OT Environments
Whitepapers
PIPEDREAM: CHERNOVITE’s Emerging Malware Targeting Industrial Control Systems
Whitepapers
An Intelligence Perspective on Insider Threat & the Unique Role It Plays in…
Whitepapers
A Risk Assessment for Ransomware Prevention in OT Environments
Year in Review
Annual lessons learned from hunting and incident response.
READ REPORTS
Dragos 2023 ot cybersecurity year in review report
Threat Activity Groups
Robust reports on the latest cyber threats.
READ REPORTS
A graphic showing various IT components from Dragos
Events
Live and virtual events featuring our experts.
VIEW EVENTS
Event
DISC 2024 Asia-Pacific
Location Icon

SYDNEY, AUS

Calendar Icon
Event
IoT Integrator Virtual Summit
Calendar Icon
Webinars
Live and on-demand cybersecurity virtual events.
VIEW WEBINARS
Webinars
PIPEDREAM Malware and the CHERNOVITE Activity Group
Calendar Icon
Webinars
5 Lessons for Integrating OT Threat Intelligence
Calendar Icon
Webinars
The 4 Qualities of Good Cyber Threat Intelligence
Calendar Icon
Webinars
Implications of Log4j Vulnerability for Operational Technology Networks
Calendar Icon
Webinars
What’s Behind the IT/OT Cultural Divide?
Calendar Icon
All Resources
Cybersecurity guidance developed by OT experts.
Browse Resources
Videos
Dragos CEO Robert M. Lee Testifies on Cybersecurity for Critical Infrastructure
Calendar Icon
Videos
The Importance of Operational Technology (OT) Cybersecurity
Calendar Icon
Solution Brief
How Dragos Supports Singapore CCoP for Critical Information Infrastructure
Solution Brief
How Dragos Helps Meet Kingdom of Saudi Arabia National Cybersecurity Authority…

Want to speak directly to a Dragos expert?

We'll put you in touch with exactly who you need.