In a previous discussion, I drew parallels between inevitable changes and the world of industrial control systems, suggesting that secure remote access is no longer a question of if, but how. Today, I want to expand on the how, exploring the different methods organisations use to provide remote access to their critical industrial environments. There are four main approaches we see in the field, each with its own set of benefits and drawbacks. Let’s delve into what they are, how they work, a...