Authenticated vulnerability scanning in OT environment
Most technical people and researchers are saying that implementing vulnerability scanning in an Operational Technology environment is not a feasible thing due to specific equipment limitations. So, what can be done to identify open vulnerabilities?