IT/OT

Cybersecurity advice for industrial networks

Cybersecurity advice for industrial networks

Cybersecurity Insights There is a greater risk of cybersecurity attack against operational technology (OT) targets as machines become integrated with information technology (IT) systems. Consulting with subject matter experts (SMEs) and system integrators who are […]

Courtesy: Brett Sayles

Cybersecurity Roundtable: IT and OT compliance

IT and OT Insights IT and OT should be assessed differently from one another. However, if there is a set list of tasks to do with them working together, it must get done, which allows […]

Courtesy of CFE Media and Technology

Assessing ransomware risk in IT and OT environments

Cybersecurity insights Ransomware is a type of cyberattack where a threat actor steals data from a company and holds it for ransom — although companies have been known to pay the ransom and get nothing […]

IT/OT convergence

How OT asset visibility enables effective threat detection

Solid asset management sits at the foundation of all cybersecurity activities. Enumerating assets into a solid inventory, tracking their current state – including configurations and versions deployed, and mapping their relationships all go a long […]

Back door to a building.

IBM Data Breach Report shows costs are rising

Cybersecurity insights The 2021 IBM Security Data Breach Report outlines key factors contributing to the rising costs of data breaches for industries all over the world. Health care has continued to be the most affected […]

Cybersecurity advice for industrial networks

Cybersecurity advice for industrial networks

Cybersecurity Insights There is a greater risk of cybersecurity attack against operational technology (OT) targets as machines become integrated with information technology (IT) systems. Consulting with subject matter experts (SMEs) and system integrators who are […]

Courtesy: Brett Sayles

Cybersecurity Roundtable: IT and OT compliance

IT and OT Insights IT and OT should be assessed differently from one another. However, if there is a set list of tasks to do with them working together, it must get done, which allows […]

Courtesy of CFE Media and Technology

Assessing ransomware risk in IT and OT environments

Cybersecurity insights Ransomware is a type of cyberattack where a threat actor steals data from a company and holds it for ransom — although companies have been known to pay the ransom and get nothing […]

IT/OT convergence

How OT asset visibility enables effective threat detection

Solid asset management sits at the foundation of all cybersecurity activities. Enumerating assets into a solid inventory, tracking their current state – including configurations and versions deployed, and mapping their relationships all go a long […]

Back door to a building.

IBM Data Breach Report shows costs are rising

Cybersecurity insights The 2021 IBM Security Data Breach Report outlines key factors contributing to the rising costs of data breaches for industries all over the world. Health care has continued to be the most affected […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES