Webcast: Are You Cyber Safe? Managing Risk to Achieve Safety and Security for Cyber Physical Systems
In today’s interconnected digital landscape, the risks to the industrial sector are greater than ever. Whether these come from outside the organization or from simple human error, the resulting disruptions can be significant, from shutting […]
Vendor and version lock threats to industrial cybersecurity
Vendor and version lock insights: Overreliance on OEMs and outdated software in OT/ICS environments exposes organizations to vulnerabilities, limiting flexibility to adopt new security technologies and increasing uniform risks across systems. To mitigate risks, organizations […]
New study finds 80% of organizations experienced an email security breach in the last year
OPSWAT, a global company focused on critical infrastructure protection (CIP) cybersecurity solutions, today released the 2024 Report: Email Security Threats Against Critical Infrastructure Organizations. This research was conducted with Osterman Research, known for its in-depth […]
Phishing and ransomware attacks threatening nation’s critical infrastructure
New research shows that 62% of critical infrastructure organizations across the federal government, civil aviation, energy, transportation (rail and road combined) and finance sectors have experienced a ransomware attack in the past 12 months, with data […]
How to navigate the challenges of OT patching
In the world of cybersecurity, patching is a critical practice to address vulnerabilities and protect systems from potential threats. However, the approach to patching differs significantly between information technology (IT) and operational technology (OT) environments. […]
New report tracks an 18% increase in ransomware attacks year-over-year
A new report uncovered an 18% overall increase in ransomware attacks year-over-year, as well as a record-breaking ransom payment.
Network security is not enough for OT data
Whatever level of network security you have, there are easy and affordable ways to access your OT data securely.
eBook: IT/OT Convergence – Summer Edition
This eBook includes stories on how to design for IT/OT security challenges and ways to accelerate digital transformation.
How should we assess the U.S. cybersecurity posture?
How should we be measuring the cybersecurity posture of the U.S.: activity, success, achievement? It’s hard to say.
eBook: Throwback Attacks – Summer Edition
This Throwback Attacks eBook includes stories on how Chinese hackers stole plans for the F-35 and why protecting critical assets is important.