IT OT Convergence: 3 Things OT Should Immediately Adopt from Current IT Trends
OT teams should adopt IT trends like real-time inventory databases, automation of security remediation and centralized support teams for OT environments.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems
OT teams should adopt IT trends like real-time inventory databases, automation of security remediation and centralized support teams for OT environments.
Read moreProviding OT or system-specific context to true, ICS Cyber Security Risk
Read more99% of cyber incidents happen in the critical infrastructure and Industrial Control System (ICS) space through commodity systems such as Microsoft Windows.
Read moreReducing OT cyber security attack surface by disabling USB ports as a best practice system hardening task
Read moreDriving empirical analysis of OT cyber security risk in providing effective OT asset management practices.
Read moreConverting physical systems to virtual representations when Microsoft End of Lifes (EOLs) Occur on an Operating System
Read moreAn initial process on Risk management and vulnerability management in terms of probabilities of successful cyber attacks on Operational Technology (OT)
Read moreIT and OT worlds continue to run into one another – why is that a challenge? Because good intentions without proper context can lead to disaster!
Read morePragmatically examining exposure as part of the risk reduction process to prevent and mitigate risks without fear-uncertainty-and-doubt (FUD).
Read moreExploring how to map Department of Defense CMMC to NIST CSF, 800-82 and 800-171 for enhanced target security levels and controls.
Read moreOT cyber security requires a wider and deeper understanding of what assets are in an OT environment to proactively plan and execute much-needed security practices.
Read more