{"id":1387,"date":"2025-02-10T10:00:00","date_gmt":"2025-02-10T18:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1387"},"modified":"2025-06-19T08:15:35","modified_gmt":"2025-06-19T15:15:35","slug":"security-risks-in-internet-exposed-scada-in-manufacturing","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/","title":{"rendered":"Security Risks in Internet-exposed SCADA in Manufacturing"},"content":{"rendered":"\n<p>Industrial control systems (ICS) and SCADA (Supervisory Control and Data Acquisition) environments were never designed to be exposed to the internet. Yet, as manufacturing enterprises embrace digital transformation, they find themselves in a challenging position\u2014balancing operational efficiency with cybersecurity risk.<\/p>\n\n\n\n<p>For one Fortune 500 global manufacturer client, this challenge caused a potentially exploitable vulnerability. In an effort to modernize its production facilities, the company integrated its SCADA network with cloud-based analytics and remote monitoring solutions. But in the process, multiple SCADA endpoints were accidentally left exposed to the public internet. Without strong authentication controls or segmentation, these systems became attractive targets for attackers. (Figure 1).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"878\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp\" alt=\"\" class=\"wp-image-1390\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-512x351.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-768x527.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1536x1054.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9.webp 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<p class=\"caption\">Figure 1. A Fortune 500 global manufacturer\u2019s SCADA system that was compromised via its cloud-based monitoring solution.<\/p>\n\n\n\n<p>The implications were severe:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Production Disruptions:<\/strong> Unauthenticated access to SCADA systems meant attackers could potentially manipulate industrial processes, leading to downtime.<\/li>\n\n\n\n<li><strong>Safety Hazards:<\/strong> SCADA systems control physical machinery, meaning an attacker could disrupt factory equipment, harming workers and damaging assets.<\/li>\n\n\n\n<li><strong>Data Integrity Risks:<\/strong> SCADA systems handle critical telemetry data. Unauthorized access could allow attackers to alter parameters, leading to faulty production output.<\/li>\n\n\n\n<li><strong>Regulatory and Compliance Violations:<\/strong> Many industries mandate strict cybersecurity controls for ICS\/SCADA, such as NIST 800-82 and IEC 62443. Failure to secure these environments could result in fines and reputational damage.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Challenge: Blind Spots in Traditional Security Tools<\/h2>\n\n\n\n<p>Despite using conventional vulnerability management and network security tools, the aforementioned company remained unaware of these exposures. Why? Because legacy scanners and asset management tools rely on predefined IP ranges and manual inputs\u2014meaning they often miss the unknown or misconfigured assets within sprawling IT and OT environments.<\/p>\n\n\n\n<p>In this case, the SCADA systems were connected via a third-party vendor\u2019s remote access solution, which created an unintended internet-facing exposure. The company\u2019s security team had no visibility into these risks because the asset wasn&#8217;t registered in their inventory. This is a textbook example of <em>shadow OT<\/em>\u2014a growing problem where connected operational technology assets exist outside the security team\u2019s awareness.<\/p>\n\n\n\n<p>The company&#8217;s security team had no visibility into this risk because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The SCADA systems were not properly inventoried<\/strong> \u2013 They weren\u2019t tracked within the organization&#8217;s asset management system.<\/li>\n\n\n\n<li><strong>The third-party solution created an unintended exposure<\/strong> \u2013 The remote access tool likely had insecure default settings, lacked strict access controls, or wasn\u2019t properly configured to restrict external communication.<\/li>\n\n\n\n<li><strong>Legacy security tools rely on predefined IP ranges<\/strong> \u2013 Traditional scanners and asset management platforms depend on manually inputted asset lists, so if the security team didn\u2019t know these SCADA endpoints were internet-facing, they wouldn\u2019t have been scanned or monitored.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Solution: External Exposure Management<\/h2>\n\n\n\n<p>To avoid shadow OT problems, manufacturers need to implement what\u2019s called external exposure management. In short, this is the process of taking the attacker\u2019s view from the outside and managing risk based on the accessibility and attractiveness of exposed assets.&nbsp;<\/p>\n\n\n\n<p>This was an actual case study of how CyCognito\u2019s <a href=\"\/external-attack-surface-management\/\">external attack surface management<\/a> (EASM) platform detected and flagged the internet-exposed SCADA endpoints, luckily before any known security incidents arose.<\/p>\n\n\n\n<p>Here\u2019s how CyCognito helped remediate the issue:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated Asset Discovery Beyond Known Ranges<\/strong>: Unlike traditional scanners, CyCognito doesn\u2019t rely on pre-defined input ranges. Instead, it autonomously maps an organization\u2019s entire external attack surface, identifying internet-facing assets\u2014including shadow IT and OT\u2014without requiring any prior knowledge from the security team.<\/li>\n\n\n\n<li><strong>High-Precision Attribution<\/strong>: Using advanced AI-driven reconnaissance, CyCognito accurately attributed the exposed SCADA endpoints to the correct business unit and flagged them as high-risk operational assets requiring immediate remediation.<\/li>\n\n\n\n<li><strong>Risk-Based Prioritization<\/strong>: Not all exposures are equal. Instead of overwhelming the security team with thousands of alerts, CyCognito focused on what truly matters\u2014vulnerabilities that are both exploitable and business-critical. In this case, the exposed SCADA systems were ranked as top-priority threats due to their direct impact on production and safety.<\/li>\n\n\n\n<li><strong>Guided Remediation with Ownership Assignment<\/strong>: One of the biggest challenges in large enterprises is ensuring security teams, IT teams, and OT engineers collaborate effectively. CyCognito not only provided detailed remediation guidance, but also automatically assigned ownership to the relevant stakeholders within the organization, ensuring swift resolution.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Lessons Learned: Securing Manufacturing in the Digital&nbsp;Era<\/h2>\n\n\n\n<p>This incident underscores a critical reality for manufacturers\u2014security gaps often emerge at the intersection of IT and OT environments. As companies accelerate digital transformation initiatives, they must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Adopt a Continuous External Exposure Management Strategy:<\/strong> Periodic security scans aren\u2019t enough. Attack surfaces are dynamic, and new exposures emerge constantly.<\/li>\n\n\n\n<li><strong>Gain Full Visibility Across IT, OT, and Third-Party Networks:<\/strong> Every connection\u2014including third-party integrations\u2014must be continuously monitored for security risks.<\/li>\n\n\n\n<li><strong>Implement Risk-Based Security Testing:<\/strong> Not all vulnerabilities pose the same level of risk. Security teams must prioritize remediating the <strong>most exploitable and business-critical<\/strong> exposures first.<\/li>\n\n\n\n<li><strong>Automate Asset Attribution and Ownership Assignment:<\/strong> Security is a cross-functional effort. Organizations must ensure that vulnerabilities are properly assigned to accountable teams for remediation.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thought: Take Control Before Attackers Do<\/h2>\n\n\n\n<p>For this Fortune 500 manufacturer, CyCognito provided the critical visibility and remediation guidance needed to avert a potential cyber incident. But this is just one case among many. Every manufacturing company must ask itself:<strong> <\/strong>Do we know what\u2019s truly exposed? And if not, who else does?<\/p>\n\n\n\n<p>Discover and secure your attack surface today. Contact CyCognito to learn how we can help eliminate blind spots before attackers exploit them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As manufacturing enterprises adopt digital transformation, integrating SCADA with cloud-based solutions introduces serious cybersecurity risks. This case study highlights how a Fortune 500 manufacturer inadvertently exposed SCADA systems to the internet, making them vulnerable to attacks. Traditional security tools failed to detect these exposures due to blind spots in asset inventory and reliance on predefined IP ranges. By leveraging external exposure management, the company identified and remediated these risks before exploitation. This incident underscores the need for continuous attack surface monitoring, risk-based prioritization, and automated asset discovery to secure operational technology (OT) environments against emerging threats.<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[206],"tags":[224,222,225,221,33,223],"class_list":["post-1387","post","type-post","status-publish","format-standard","hentry","category-strategy","tag-asset-management","tag-asset-mapping","tag-attack-surface-monitoring","tag-customer-story","tag-exposure-management","tag-scada"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Risks in Internet-exposed SCADA in Manufacturing | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risks in Internet-exposed SCADA in Manufacturing\" \/>\n<meta property=\"og:description\" content=\"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T15:15:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-02-10-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob Gurzeev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Gurzeev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\"},\"author\":{\"name\":\"Rob Gurzeev\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\"},\"headline\":\"Security Risks in Internet-exposed SCADA in Manufacturing\",\"datePublished\":\"2025-02-10T18:00:00+00:00\",\"dateModified\":\"2025-06-19T15:15:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\"},\"wordCount\":901,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp\",\"keywords\":[\"Asset Management\",\"Asset Mapping\",\"Attack Surface Monitoring\",\"Customer Story\",\"Exposure Management\",\"SCADA\"],\"articleSection\":[\"Strategy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\",\"name\":\"Security Risks in Internet-exposed SCADA in Manufacturing | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp\",\"datePublished\":\"2025-02-10T18:00:00+00:00\",\"dateModified\":\"2025-06-19T15:15:35+00:00\",\"description\":\"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9.webp\",\"width\":1600,\"height\":1098},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Risks in Internet-exposed SCADA in Manufacturing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\",\"name\":\"Rob Gurzeev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"caption\":\"Rob Gurzeev\"},\"description\":\"CEO &amp; Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Risks in Internet-exposed SCADA in Manufacturing | CyCognito Blog","description":"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/","og_locale":"en_US","og_type":"article","og_title":"Security Risks in Internet-exposed SCADA in Manufacturing","og_description":"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.","og_url":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/","og_site_name":"CyCognito Blog","article_published_time":"2025-02-10T18:00:00+00:00","article_modified_time":"2025-06-19T15:15:35+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-02-10-2400x1256-email.png","type":"image\/png"}],"author":"Rob Gurzeev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rob Gurzeev","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/"},"author":{"name":"Rob Gurzeev","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679"},"headline":"Security Risks in Internet-exposed SCADA in Manufacturing","datePublished":"2025-02-10T18:00:00+00:00","dateModified":"2025-06-19T15:15:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/"},"wordCount":901,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp","keywords":["Asset Management","Asset Mapping","Attack Surface Monitoring","Customer Story","Exposure Management","SCADA"],"articleSection":["Strategy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/","url":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/","name":"Security Risks in Internet-exposed SCADA in Manufacturing | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9-1280x878.webp","datePublished":"2025-02-10T18:00:00+00:00","dateModified":"2025-06-19T15:15:35+00:00","description":"Internet-exposed SCADA in manufacturing creates severe security risks. Learn how external exposure management prevents costly cyber incidents.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-9.webp","width":1600,"height":1098},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/security-risks-in-internet-exposed-scada-in-manufacturing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Risks in Internet-exposed SCADA in Manufacturing"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679","name":"Rob Gurzeev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","caption":"Rob Gurzeev"},"description":"CEO &amp; Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1387"}],"version-history":[{"count":11,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1387\/revisions"}],"predecessor-version":[{"id":1572,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1387\/revisions\/1572"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}