Search
Close this search box.

IT/OT

Securing OT in remote working conditions

Securing OT in remote working conditions

As organizations have been forced to transition to remote working, security professionals tasked with defending critical infrastructure and operational technology (OT) systems have been presented a broad set of challenges. New business measures, many of […]

Image contains wires plugged into a digital device.Image courtesy: Brett Sayles

How the EU Machinery Directive will change regulation

The Machinery Directive 2006/42 /EC had not been revised for 15 years and clearly needed updating. And so, a written proposal for the new machinery regulation was issued on April 21, 2021. However, since we do […]

Verve Industrial CEO John Livingston discusses increasing industrial cybersecurity threat

Four key steps to help your organization achieve IT/OT convergence

In many industrial organizations, information technology (IT) and operational technology (OT) teams are from different planets. They have separate objectives, priorities, skills, metrics and even language. IT/OT convergence, or better said “connected industries,” requires these […]

The IT/OT convergence conundrum

The IT/OT convergence conundrum

What does information technology/operational technology (IT/OT) convergence mean? In the OT/IT cyber workspace, there are two types of companies – those seeking to converge and those that have never diverged. Both must change and both […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

An overlooked ICS cybersecurity gap for companies

Cyber attacks on critical infrastructure’s industrial control systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions that ironically were fueled by a […]

Courtesy: Velta Technology

What OT teams can learn from IT strategies and structure

IT (information technology) and OT (operational technology) teams have historically and traditionally been separated over the years – and for good reason. Their priorities are different. Their approaches and processes are different. They are truly […]

Hardening acts by remediating known vulnerabilities, by positioning the system to reject certain classes of attack, and by documenting system activities. Courtesy: Maverick Technologies

Six steps to improve computer hardening

Learning Objectives Hardening is a process whereby a computer is made more resistant to cyber intrusion from malicious attack and from accidental infection. Companies should update and patch their systems as often as they can. […]

Securing OT in remote working conditions

Securing OT in remote working conditions

As organizations have been forced to transition to remote working, security professionals tasked with defending critical infrastructure and operational technology (OT) systems have been presented a broad set of challenges. New business measures, many of […]

Image contains wires plugged into a digital device.Image courtesy: Brett Sayles

How the EU Machinery Directive will change regulation

The Machinery Directive 2006/42 /EC had not been revised for 15 years and clearly needed updating. And so, a written proposal for the new machinery regulation was issued on April 21, 2021. However, since we do […]

Verve Industrial CEO John Livingston discusses increasing industrial cybersecurity threat

Four key steps to help your organization achieve IT/OT convergence

In many industrial organizations, information technology (IT) and operational technology (OT) teams are from different planets. They have separate objectives, priorities, skills, metrics and even language. IT/OT convergence, or better said “connected industries,” requires these […]

The IT/OT convergence conundrum

The IT/OT convergence conundrum

What does information technology/operational technology (IT/OT) convergence mean? In the OT/IT cyber workspace, there are two types of companies – those seeking to converge and those that have never diverged. Both must change and both […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

An overlooked ICS cybersecurity gap for companies

Cyber attacks on critical infrastructure’s industrial control systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions that ironically were fueled by a […]

Courtesy: Velta Technology

What OT teams can learn from IT strategies and structure

IT (information technology) and OT (operational technology) teams have historically and traditionally been separated over the years – and for good reason. Their priorities are different. Their approaches and processes are different. They are truly […]

Hardening acts by remediating known vulnerabilities, by positioning the system to reject certain classes of attack, and by documenting system activities. Courtesy: Maverick Technologies

Six steps to improve computer hardening

Learning Objectives Hardening is a process whereby a computer is made more resistant to cyber intrusion from malicious attack and from accidental infection. Companies should update and patch their systems as often as they can. […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES