Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
Palo Alto Unit 42
Archived Mar 16, 2026
✓ Full text saved
Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. The post Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security appeared first on Unit 42 .
✦ Summarize
☆ Save
Full text archived locally
Why OT Defenses Often Start Too Late
Industrial organizations are facing a growing paradox in cybersecurity. While operational technology (OT) environments are increasingly connected, most security strategies still assume threats will only materialize once attackers reach the plant floor. In reality, attacks that disrupt industrial operations rarely begin in OT environments. They originate upstream, progress over time and frequently exploit the persistent assumption of isolation. This shift fundamentally changes how defenders must think about visibility, detection and response across Information Technology (IT) and OT domains.
Recent joint research by Palo Alto Networks OT Threat Research Lab, Siemens Cybersecurity Lab and the Idaho National Laboratory challenges several long-held assumptions about how OT attacks originate, evolve and can be stopped. By analyzing global OT network telemetry alongside decades of historical incident data, the research shows that defenders often have far more time and visibility than commonly believed — if they know where to look.
This blog explores how focusing on the network edge, predictive threat behavior and an edge-driven OT security operations model can transform time from a liability into a strategic advantage. Our full findings are detailed in our joint whitepaper, “Intelligence-Driven Active Defense: Securing Operational Technology Environments.”
Threats That Disrupt OT Operations Are Rarely OT-Centric
One of the most persistent myths in industrial security is that OT attacks are fundamentally different from IT attacks. While industrial systems do have unique safety and availability requirements, the paths adversaries use to reach them are often familiar.
Across manufacturing, energy and other critical infrastructure incidents, production shutdowns frequently originate from common IT compromises that occur well before attackers ever interact with industrial systems. This boundary — the network edge between IT and OT — is where attackers often expose themselves through anomalous access patterns, protocol misuse or reconnaissance activity.
Understanding this shift reframes OT defense. The question is no longer whether threats will reach OT systems, but whether defenders can detect and disrupt them before they do.
The Edge Is Where Time Still Exists
In some technology contexts, the term “edge” could refer to digital transformation, analytics or industrial IoT architectures. In OT security, however, the edge is best understood as a strategic control point: the network and security layer where external connectivity, IT systems and OT environments converge.
Our joint research shows that this convergence layer plays a far more critical role in OT incidents than commonly assumed. Internet-exposed OT assets continue to expand, with a 332% increase between 2023-2024 in unique, exposed OT devices and services and nearly 20 million OT-related assets observable on the public internet. Exposure increases risk, but it does not equate to successful disruption. In many cases, it instead creates opportunities for earlier detection and more effective defense.
The data reveals a more consistent pattern: approximately 70% of attacks impacting OT operations originate within IT environments. Across incidents, adversaries frequently begin with familiar enterprise-focused techniques such as credential abuse, brute force attempts and exploitation of IT-facing services. They then progress across shared identity systems, remote access pathways and management infrastructure before executing OT-specific actions.This progression is what makes the edge strategically decisive.
Adversaries rarely move directly from initial compromise to operational impact. They must traverse multiple control layers, generating detectable signals through authentication anomalies, session deviations, protocol misuse and reconnaissance activity.
Time exists at the edge because adversaries must cross it. The edge is therefore not simply where networks connect. It is where defenders retain their greatest advantage: the opportunity to detect and disrupt threats before safety-critical OT functions are affected.
But the edge is not only important because attackers must traverse it. Its true strategic value lies in something even more powerful: the remarkable consistency of adversary behavior.
Predictable Adversary Behavior Creates a Window for Defense
Analysis of more than two decades of OT incidents reveals a striking reality: adversaries rarely operate with the randomness often attributed to them.
Across observed incidents, 82.8% of adversary activity occurred during extended precursor phases, long before operational disruption. On average, attackers remained present for approximately 185 days prior to initiating impact-level activity. This extended dwell time fundamentally reshapes the OT security narrative.
In this context, dwell time refers to the period between an adversary’s initial compromise and the point of disruptive or impact-level activity. It captures how long attackers remain active within an environment while conducting reconnaissance, credential abuse, lateral movement and staging activities prior to operational consequences.
OT disruptions are not typically sudden events. They are the result of gradual progression — reconnaissance, credential abuse, lateral movement, staging — all of which produce detectable signals. While adversaries may differ in tooling, targets or intent, the structure of their behavior remains remarkably consistent.
This consistency is what creates a defensive advantage. When early-stage behaviors are observed at the IT–OT edge, defenders are not reacting to an inevitable outcome — they are interrupting a progression already in motion. The implication is critical: exposure does not automatically translate to disruption.
Rather than treating OT defense as a race against impact, organizations can treat it as a problem of earlier detection and intervention. Techniques such as attack-chain analysis and adversary progression modeling can further support this shift by helping defenders anticipate likely attacker pathways. But the central insight remains clear:
Attackers spend far more time preparing than executing disruption. For defenders, this transforms time from a constraint into a strategic asset.
From Passive Monitoring to Active Defense in OT Environments
The extended dwell times and observable precursor behaviors described earlier create a critical opportunity for defenders. Yet many industrial security programs remain heavily focused on asset inventories and passive monitoring alone. While visibility is essential, it is insufficient by itself. Visibility without response capability does not prevent disruption. This is where OT SecOps becomes essential.
OT SecOps (Operational Technology Security Operations) can be understood as the disciplined practice of detecting, analyzing and safely responding to cyber threats in industrial environments. Unlike traditional IT security operations, OT SecOps is designed around operational continuity, safety constraints and process integrity.
Effective OT SecOps evolves through a progressive security maturity model aligned with established industrial security principles, such as IEC 62443 (an internationally recognized framework for securing industrial automation and control systems.):
Architectural Defense establishes secure zones, conduits and segmentation, creating the structural foundation for control and containment.
Passive Defense provides the telemetry needed to observe abnormal behavior across industrial protocols and network flows.
Active Defense builds on this foundation by enabling pre-approved, OT-specific response actions at the edge, before process impact occurs.
Active Defense capabilities can be implemented through multiple operational mechanisms, including structured response playbooks, threat hunting, containment strategies and OT-specific security operations models such as OT Security Operations Center (OT SOC).
The OT SOC provides a coordinated framework for detection, analysis and controlled intervention, transforming architectural stability and passive visibility into operational defense. By aligning telemetry, analytics and response workflows, the OT SOC enables organizations to disrupt adversary progression while preserving operational continuity and safety constraints.
Without architectural controls and passive visibility, OT SecOps cannot function effectively. Without Active Defense, detection remains reactive and late.
IT–OT SOC Convergence Without Compromise
While the OT SOC strengthens Active Defense within industrial environments, it cannot operate in isolation. The same research that highlights extended dwell times and precursor behaviors also shows that a majority of OT-impacting incidents originate within IT environments.
This creates a structural reality for modern security operations: effective defense requires coordination across both domains. IT–OT SOC convergence is often misunderstood as consolidation, replacement or the absorption of OT security into traditional enterprise workflows. In practice, convergence does not imply collapse.
IT–OT SOC convergence maintains clear separation of duties while enabling coordinated detection and response across zones and trust boundaries. IT teams often identify the early indicators of compromise, while OT teams apply operational context and execute domain-appropriate response actions.
This model allows organizations to manage cyber risk holistically without forcing industrial environments into enterprise security frameworks that may overlook critical safety and availability requirements.
The Key: Stopping Threats Early
OT security has often been framed as a problem of isolation — keeping industrial systems separate from external threats. The reality is more complex. As connectivity increases, isolation alone is no longer sufficient, nor is it realistic.
Our research shows that defenders are not as late as they think. Adversaries leave observable traces long before operational impact occurs, and these traces most often surface at the network edge. Time, in this context, becomes a measurable security variable rather than an uncontrollable constraint. Extended attacker dwell times create windows for detection, decision-making and controlled intervention. By combining edge-focused threat intelligence, predictive analysis and an OT-specific security operations model, organizations can turn time into a defensive advantage.
For leaders, this means OT security strategy should focus on where threats can be detected and stopped early, not on how far control systems can be isolated.
“Bring the fight to the edge” is not a slogan — it is a strategic shift. In OT environments, defense is about time, and the edge is where defenders still have it.
Additional Resources
Joint OT Threat Research White Paper – Palo Alto Networks, Siemens, Idaho National Laboratory
* CyOTE™ and Attack Chain Estimator (ACE) ©2026 Battelle Energy Alliance, LLC ALL RIGHTS RESERVED Prepared by Battelle Energy Alliance, LLC Under Contract No. DE-AC07-05ID14517 With the U. S. Department of Energy
Back to top
TAGS
Defense
Operational Technology
Threat detection
Threat Research Center
Next: VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
TABLE OF CONTENTS
Why OT Defenses Often Start Too Late
Threats That Disrupt OT Operations Are Rarely OT-Centric
The Edge Is Where Time Still Exists
Predictable Adversary Behavior Creates a Window for Defense
From Passive Monitoring to Active Defense in OT Environments
IT–OT SOC Convergence Without Compromise
The Key: Stopping Threats Early
Additional Resources
RELATED ARTICLES
The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
Multiple Vulnerabilities Discovered in a SCADA System
Related General Resources
INSIGHTS
October 14, 2025
Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer
BlackSuit ransomware
Ignoble Scorpius
Reconnaissance
Read now
INSIGHTS
October 7, 2025
Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report
Cloud Infrastructure Protection
Cloud Security
Unit 42 Incident Response Report
Read now
INSIGHTS
September 26, 2025
Threat Insights: Active Exploitation of Cisco ASA Zero Days
Cisco
CVE-2025-20333
CVE-2025-20362
Read now
INSIGHTS
March 16, 2026
Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization
Agonizing Serpens
Agrius
Curious Serpens
Read now
INSIGHTS
March 12, 2026
Insights: Increased Risk of Wiper Attacks
Hacktivism
Wiper
Read now
INSIGHTS
January 23, 2026
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense
Cyber Threat Alliance
Unit 42
Read now
INSIGHTS
January 8, 2026
Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk
GenAI
Read now
INSIGHTS
December 16, 2025
Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene
Cybersecurity
MFA
Patchwork
Read now
INSIGHTS
December 2, 2025
The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen
Cloud Security
Defense
Read now
INSIGHTS
October 14, 2025
Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer
BlackSuit ransomware
Ignoble Scorpius
Reconnaissance
Read now
INSIGHTS
October 7, 2025
Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report
Cloud Infrastructure Protection
Cloud Security
Unit 42 Incident Response Report
Read now
INSIGHTS
September 26, 2025
Threat Insights: Active Exploitation of Cisco ASA Zero Days
Cisco
CVE-2025-20333
CVE-2025-20362
Read now
INSIGHTS
March 16, 2026
Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization
Agonizing Serpens
Agrius
Curious Serpens
Read now
INSIGHTS
March 12, 2026
Insights: Increased Risk of Wiper Attacks
Hacktivism
Wiper
Read now
INSIGHTS
January 23, 2026
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense
Cyber Threat Alliance
Unit 42
Read now
INSIGHTS
January 8, 2026
Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk
GenAI
Read now
INSIGHTS
December 16, 2025
Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene
Cybersecurity
MFA
Patchwork
Read now
INSIGHTS
December 2, 2025
The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen
Cloud Security
Defense
Read now
INSIGHTS
October 14, 2025
Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer
BlackSuit ransomware
Ignoble Scorpius
Reconnaissance
Read now
INSIGHTS
October 7, 2025
Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report
Cloud Infrastructure Protection
Cloud Security
Unit 42 Incident Response Report
Read now
INSIGHTS
September 26, 2025
Threat Insights: Active Exploitation of Cisco ASA Zero Days
Cisco
CVE-2025-20333
CVE-2025-20362
Read now