Search
Close this search box.

IT/OT

Seven questions to ask when choosing an OT cybersecurity solution

Seven questions to ask when choosing an OT cybersecurity solution

Cyberattacks against industrial control systems (ICS) are growing in number and sophistication each year. The potential financial impacts from these attacks are growing in parallel. Major attacks, like the Colonial Pipeline and JBS meat plant incidents, have served as […]

Courtesy: Brett Sayles

Asset visibility vs. asset management

More than two thousand years ago, ancient tactician Sun Tzu famously observed that, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” While the world looks […]

Image of IT/OT convergence on a control panel

Five things IT can learn from OT about cybersecurity

It’s no secret that industrial organizations are at the forefront of cybersecurity attacks. A recent report by IBM X-force revealed the manufacturing industry jumped from the eighth most targeted industry to the second most targeted […]

Three ways to ask a CISO for an OT cybersecurity budget

Three ways to ask a CISO for an OT cybersecurity budget

There have been many papers and blogs written recently about how to ask your chief information security officer (CISO) for a cybersecurity budget or how operational technology (OT) personnel should engage with CISOs to ensure […]

Courtesy: Chris Vavra, CFE Media and Technology

System integrators’ role in the OT cybersecurity crisis

Whether it’s the shift toward remote work or the growing importance of digital business, trends that have been around for years have only been accelerated by the COVID-19 pandemic. This holds true for the digital […]

Courtesy: CFE Media

How to solve legacy OT security challenges

In the course of everyday life, many of the decisions we make about information technology (IT) in a business context are simpler than they may seem at first glance. If people are buying mobile phones […]

Seven questions to ask when choosing an OT cybersecurity solution

Seven questions to ask when choosing an OT cybersecurity solution

Cyberattacks against industrial control systems (ICS) are growing in number and sophistication each year. The potential financial impacts from these attacks are growing in parallel. Major attacks, like the Colonial Pipeline and JBS meat plant incidents, have served as […]

Courtesy: Brett Sayles

Asset visibility vs. asset management

More than two thousand years ago, ancient tactician Sun Tzu famously observed that, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” While the world looks […]

Image of IT/OT convergence on a control panel

Five things IT can learn from OT about cybersecurity

It’s no secret that industrial organizations are at the forefront of cybersecurity attacks. A recent report by IBM X-force revealed the manufacturing industry jumped from the eighth most targeted industry to the second most targeted […]

Three ways to ask a CISO for an OT cybersecurity budget

Three ways to ask a CISO for an OT cybersecurity budget

There have been many papers and blogs written recently about how to ask your chief information security officer (CISO) for a cybersecurity budget or how operational technology (OT) personnel should engage with CISOs to ensure […]

Courtesy: Chris Vavra, CFE Media and Technology

System integrators’ role in the OT cybersecurity crisis

Whether it’s the shift toward remote work or the growing importance of digital business, trends that have been around for years have only been accelerated by the COVID-19 pandemic. This holds true for the digital […]

Courtesy: CFE Media

How to solve legacy OT security challenges

In the course of everyday life, many of the decisions we make about information technology (IT) in a business context are simpler than they may seem at first glance. If people are buying mobile phones […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES