Tag: OT
-
Ransomware dominates OT security incidents
Operational technology security incidents impacted 46% of organizations around the world during the past year, with ransomware accounting …
-
Industrial Defender collaborates with Dragos to enhance outcomes for OT operators
Industrial Defender announced a strategic technology partnership with Dragos. The collaboration between these leaders in OT cybersecurity …
-
Review: Engineering-grade OT security: A manager’s guide
Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a …
-
IT and OT cybersecurity: A holistic approach
In the realm of cybersecurity, both information technology (IT) and operational technology (OT) present distinct challenges that …
-
CISO of Fortune 35 company talks 55 million alerts
In this edited interview excerpt from the CISO’s Secrets podcast, CISO Thomas Dager shares insights into managing alerts, IoT, growing …
-
IoT security startup Phosphorus raises $27M for research and development
Internet of things security startup Phosphorus Cybersecurity Inc. today announced that it has raised $27 million in new funding to …
-
Novel Fortinet OT security solutions unveiled
SiliconAngle reports that mounting cybersecurity risks faced by operational technology environments have prompted Fortinet to launch not …
-
Fortinet enhances its OT security solutions and services
Fortinet announced the latest release of new, integrated operational technology (OT) security solutions and services. These additions …
-
Fortinet strengthens OT security with enhanced FortiGuard Service and new hardware
Cybersecurity firm Fortinet Inc. today announced the release of new, integrated operational technology security solutions and services …
-
Industry regulations and standards are driving OT security priorities
When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty. …
-
Obfuscated cyberattacks likely with Delta OT monitoring product bugs
Malicious cyber activity could be deployed by threat actors without being undetected through the exploitation of four vulnerabilities in …
-
Stronger OT cybersecurity sought by Claroty, Network Perception collaboration
SiliconAngle reports that Claroty and Network Perception have entered a partnership deal to provide a consolidated and comprehensive audit …
●●●