Advice for CISOs on Bridging the IT-OT Security Gap: Part 1
Hi, what are you looking for?
Advice for CISOs on Bridging the IT-OT Security Gap: Part 1
Strategies for Evaluating Secure Remote Access Solutions for OT/ICS Networks
In my previous column, I talked about the rapidly changing geopolitical landscape and the escalation of cyberattacks on critical infrastructure. Some of you may...
Organizations Must Understand What’s Driving the Escalated Targeting of Industrial Networks
The Opportunity for OT Security Teams to Fill the Gaps in Their Visibility Has Never Been Better
The Next Year Will Surprise All of Us in at Least One Way or Another
Critical Infrastructure Operators Must Plan for Scenarios in Which a Physical and Cyber Event Occur Simultaneously
Let’s start this column with some good news.
I touched on network segmentation in my previous column, You Know You’re at Risk, Now What? and although it is a fairly foundational security...
Last month, in The War Few are Talking About, I described industrial cyberattacks as a form of “economic warfare” designed to advance geopolitical agendas.
There is a growing war among nations and the potential victims may not even know they are targeted as pawns in a larger geopolitical...
Nothing in industrial cybersecurity is as simple as ABC. Protecting complex, yet aging industrial networks against direct and indirect attacks, planned by increasingly sophisticated...