Four benefits of OT endpoint security asset management
In information technology (IT), organizations have options to choose from to discover and aggregate asset information. In operation technology (OT), security asset management – discovery,…
Share
Using Machine Learning to Protect OT: Expert Interview Series, Richard Robinson, Cynalytica
The last calendar year has been defined by cyberattacks. They’ve hit everyone from businesses to oil pipelines to hospitals, often bringing operations to a standstill and having…
Share
Adapting XDR for OT cybersecurity
Chief information security officers (CISOs) and directors of cybersecurity at industrial organizations continue to be frustrated at the challenge of applying core information technology (IT)…
Share
How Conti ransomware took down operational technology
Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also…
Share
Dragos YIR report shows rise in threat groups, vulnerabilities and ransomware
Dragos, Inc., a leader in cybersecurity for industrial control systems (ICS)/operational technology (OT) environments, recently released its fifth annual Dragos ICS/OT Cybersecurity Year in…
Share
Operational technology risk assessments and cybersecurity principles
Assessing and monitoring the security of operation technology (OT) systems can be aided by conducting an OT cybersecurity threat risk assessment (TRA). The process is fundamental to the…
Share
Using defensive deception to prevent IT/OT manufacturing threats
Protecting information technology (IT) and operational technology (OT) networks is crucial to safeguarding the manufacturing industry. As part of the SecureAmerica’s Institute’s (SAI)…
Share
Operational technology risk assessments and security reviews
Protecting key resources and critical infrastructure (CI), such as healthcare, finance, transportation, telecommunications, energy, and water/wastewater is essential to security, public health…
Share
How ‘Think Global: Act Local’ can help manage OT security through COVID-19
In a rapidly changing world, we are grateful technology allows industrial organizations to operate their security and operational technology (OT) systems management quite effectively from a…
Share
How to implement a cybersecurity maturity model for the industrial space
Most companies realize that implementing a cybersecurity maturity model is a smart move and a necessity in today’s world. The challenge for most companies is, where do they start? Let’s walk…
Share