U.S. and international agencies Jan. 14 released guidance on secure connectivity for operational technology environments.
This year's key findings; The key to balancing security initiatives with the need for always-on; What OT security maturity looks like - and how to get there. Springer is the Director of OT Solutions ...
A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.
Cybersecurity is designed to protect modern networks and computers from cyberattacks, but much of the infrastructure for operational technology, or OT, is exposed to dangerous security gaps, often due ...
In new asset inventory guidance, the Cybersecurity and Infrastructure Security Agency, National Security Agency, Federal Bureau of Investigation and partners emphasize the importance of proactive ...
The SEC's 2026 examination priorities reveal a significant shift: Concerns about cybersecurity and AI have displaced ...
Witnesses' calls for better investment in securing such systems come just two months before a key cybersecurity information-sharing law is set to expire. Critical Infrastructure Congress CISA Cyber ...
In cybersecurity, few environments are as mission-critical—and as misunderstood—as operational technology (OT). Unlike traditional IT, which is built for centralization, cloud integration and ...
The Growing Threat to Operational Technology Operational technology systems, including industrial automation and control systems, are critical to the functioning of industries such as energy, ...
U.S. agencies are warning North American and European water treatment systems operators to be wary of and take steps to prevent a surge of Russia-linked hackers trying to break into their operational ...
Amtrak GE Genesis P42DC Diesel Locomotive pulling Amfleet Cars departure from Chicago Union Station. (Image credit: Getty Images) In November of last year, Amtrak’s Office of Inspector General ...
Fortinet's 2025 State of Operational Technology and Cybersecurity Report shows a strong correlation between OT security maturity and reduced impact from intrusions. What practical steps are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results