
IT/OT convergence requires internal stakeholders to prioritize OT security
Businesses that are over-reliant on IT to fortify OT security put themselves at risk of lost data, downtime and physical safety hazards.
Businesses that are over-reliant on IT to fortify OT security put themselves at risk of lost data, downtime and physical safety hazards.
Food and beverage manufacturers are wrestling with how to implement stronger manufacturing cybersecurity measures.
A CDV index can help measure the cyber preparedness and OT protection of a plant and critical infrastructure from cyber crime.
Looking to sell a security product to the OT market? It should require no changes to the ICS and have no impact on physical processes.
New emphasis is being placed on reducing incident severity across OT and IoT sectors, tapping into the strong safety culture of industrial environments.
A natural gas operator was hit by a ransomware attack via a spear-phishing campaign that resulted in a two-day shutdown of operations.
CISA and other organizations have released multiple notices about the importance of prioritizing vulnerabilities based on their risk.
Velta Technology and TXOne Networks offer a solution to the potential ICS and revenue disruption of the Microsoft DCOM hardening patch.
Using threat intelligence for visibility into threats to your OT network is a critical step in building a mature OT network defense.
Shadow OT is when security teams have an incomplete picture of what’s happening inside their operational systems.
Businesses that are over-reliant on IT to fortify OT security put themselves at risk of lost data, downtime and physical safety hazards.
Food and beverage manufacturers are wrestling with how to implement stronger manufacturing cybersecurity measures.
A CDV index can help measure the cyber preparedness and OT protection of a plant and critical infrastructure from cyber crime.
Looking to sell a security product to the OT market? It should require no changes to the ICS and have no impact on physical processes.
New emphasis is being placed on reducing incident severity across OT and IoT sectors, tapping into the strong safety culture of industrial environments.
A natural gas operator was hit by a ransomware attack via a spear-phishing campaign that resulted in a two-day shutdown of operations.
CISA and other organizations have released multiple notices about the importance of prioritizing vulnerabilities based on their risk.
Velta Technology and TXOne Networks offer a solution to the potential ICS and revenue disruption of the Microsoft DCOM hardening patch.
Using threat intelligence for visibility into threats to your OT network is a critical step in building a mature OT network defense.
Shadow OT is when security teams have an incomplete picture of what’s happening inside their operational systems.
Keep your finger on the pulse of top industry news
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.