How are executives and boards looking at manufacturing cybersecurity?
Rockwell Automation and Dragos look at how executives and boards are addressing the state of manufacturing cybersecurity.
New threat report finds a 400% increase in IoT and OT malware attacks
New report finds a 400% increase in IoT and OT malware attacks, underscoring need for better zero-trust security for critical infrastructure.
CISA’s Positive Impact on Cybersecurity: Cyber Awareness Podcast, Thomas Pace, Netrise
Thomas Pace discusses why supply chain attacks are soaring, how CISA is taking positive cyber steps and how Sandra Bullock can save us.
Bridging the Gap: The challenges of AI integration in automation and cybersecurity
AI has become integral to everything from supply chain optimization to cybersecurity, but that doesn’t mean its adoption has been seamless.
The art of generative AI OT payloads: from mischief to existential threat
A former hacker asks “What is the worst a hacker could do,?” and discusses how has generative AI changed the equation.
Why OT Is a Target: Cyber Awareness Podcast, Eric Byres, aDolus
Eric Byres talks about the improvement in regulatory frameworks and why OT/ICS systems are a juicy target for attackers.
Cyber-Informed Engineering: Cyber Awareness Podcast, Dr. Jesus Molina, Waterfall Security
Dr. Jesus Molina talks about threats to critical infrastructure, cyber-informed engineering and how AI is more beneficial to attackers.
Beyond Buzzwords: How to talk cybersecurity with ICS boards
How can cybersecurity professionals emphasize the importance of OT cybersecurity to ICS boards and senior leadership?
Honeywell Connect Recap: OT cybersecurity helped by AI, but also threatened
Cybersecurity insights Increasing connectivity and complexity in operational technology systems pose growing cybersecurity challenges for critical infrastructure. While AI offers potential benefits, both defenders and attackers are leveraging its capabilities, highlighting the need for vigilant […]
5 subtle things every organization should address to improve cybersecurity posture
Five subtle yet pressing threats and the holistic measures you can employ to help fortify your cybersecurity posture.