Search
Close this search box.

IT/OT

Image courtesy: Brett Sayles

Getting buy-in: Tips on presenting cybersecurity to the boardroom

As industrial cybersecurity and critical infrastructure breaches mount, senior information security officers (SISOs), information technology (IT) directors, heads of engineering and others who lead cybersecurity initiatives are increasingly required to explain their cyber risks and […]

The line between information technology (IT) and operational technology (OT) is blurred when OT data is used for further analysis and each side has different priorities, focuses and basic needs, which can complicate matters. Open communication is a must when using OT data. Courtesy: Moxa

Decoding OT data secrets

Amidst the COVID-19 pandemic, system integrators in the industrial sector moved toward one of the most influential changes in recent history, industrial digital transformation (industrial DX). However, before engaging, it is important to understand what […]

Figure 1: Cutting connections is only part of maintaining a sterile environment. There are many other paths into what is supposedly an isolated infrastructure. Courtesy: Tenable

Beware of accidental convergence

Modern industrial and critical infrastructure organizations rely on the operational technology (OT) environment to produce their goods and services. Beyond traditional information technology (IT) operations that use servers, routers, PCs and switches, these organizations also […]

Figure 2: Merging aspects of IT and OT systems requires designers to understand the distinct properties of each so they can craft a security and system design. Courtesy: Tesco

Cybersecurity demands coordinated tactics

Current industrial automation and control system (IACS) technology uses a blend of traditional control hardware and software with commercial off-the-shelf (COTS) information technology (IT) components (see Figure 1). This allows system designers to leverage an […]

Figure 1: Asset visibility and network monitoring. Courtesy: Velta Technology

What OT teams can learn from IT teams

Information technology (IT) and operational technology (OT) teams have historically been separated over the years — and for good reason. Their priorities are different. Their approaches and processes are different. They inhabit different worlds of […]

A guide to NIS Directive compliance

A guide to NIS Directive compliance

What is the NIS Directive? As part of the EU cybersecurity strategy, the European Commission first proposed the EU Network and Information Security (NIS) Directive in 2016, which was the first piece of EU-wide cybersecurity legislation. […]

Managing IT/OT systems and asset inventory tips

Managing IT/OT systems and asset inventory tips

Convergence between information technology (IT) and operational technology (OT) networks requires a wide approach in order to ensure proper visibility and security. The need to control OT processes to optimize business has led to a […]

Image courtesy: Brett Sayles

Getting buy-in: Tips on presenting cybersecurity to the boardroom

As industrial cybersecurity and critical infrastructure breaches mount, senior information security officers (SISOs), information technology (IT) directors, heads of engineering and others who lead cybersecurity initiatives are increasingly required to explain their cyber risks and […]

The line between information technology (IT) and operational technology (OT) is blurred when OT data is used for further analysis and each side has different priorities, focuses and basic needs, which can complicate matters. Open communication is a must when using OT data. Courtesy: Moxa

Decoding OT data secrets

Amidst the COVID-19 pandemic, system integrators in the industrial sector moved toward one of the most influential changes in recent history, industrial digital transformation (industrial DX). However, before engaging, it is important to understand what […]

Figure 1: Cutting connections is only part of maintaining a sterile environment. There are many other paths into what is supposedly an isolated infrastructure. Courtesy: Tenable

Beware of accidental convergence

Modern industrial and critical infrastructure organizations rely on the operational technology (OT) environment to produce their goods and services. Beyond traditional information technology (IT) operations that use servers, routers, PCs and switches, these organizations also […]

Figure 2: Merging aspects of IT and OT systems requires designers to understand the distinct properties of each so they can craft a security and system design. Courtesy: Tesco

Cybersecurity demands coordinated tactics

Current industrial automation and control system (IACS) technology uses a blend of traditional control hardware and software with commercial off-the-shelf (COTS) information technology (IT) components (see Figure 1). This allows system designers to leverage an […]

Figure 1: Asset visibility and network monitoring. Courtesy: Velta Technology

What OT teams can learn from IT teams

Information technology (IT) and operational technology (OT) teams have historically been separated over the years — and for good reason. Their priorities are different. Their approaches and processes are different. They inhabit different worlds of […]

A guide to NIS Directive compliance

A guide to NIS Directive compliance

What is the NIS Directive? As part of the EU cybersecurity strategy, the European Commission first proposed the EU Network and Information Security (NIS) Directive in 2016, which was the first piece of EU-wide cybersecurity legislation. […]

Managing IT/OT systems and asset inventory tips

Managing IT/OT systems and asset inventory tips

Convergence between information technology (IT) and operational technology (OT) networks requires a wide approach in order to ensure proper visibility and security. The need to control OT processes to optimize business has led to a […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES