Security Experts:

Connect with us

Hi, what are you looking for?



Webinar Today: Managing IoT/OT Visibility, Protection and Monitoring in a Zero Trust Environment

Microsoft Cybersecurity Webinar

Microsoft Cybersecurity Webinar

Live Webinar on May 11th – 1PM ET – Register Now

Businesses are adding more cloud connection requirements to IoT/OT environments that were designed to be closed loops. In a truly air-gapped environment, most if not all communications between devices are considered trustworthy without extensive validation. With increased internet connectivity and the risks that come with it trust needs to be earned.

Join SecurityWeek and Microsoft for at live webinar on Wednesday, May 11, 2022 at 1:00 pm EDT to learn about live zero trust enablement through monitoring and automation of IoT/OT environments.


Upcoming SecurityWeek Webinars:

● Missing Links for Managing OT Cyber Risk (May 25 – Waterfall Security)

● Threat Intelligence Summit (May 18 – Virtual Event)

● Blast Radius & Simulated Attack Paths (On Demand)

Written By

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.