Amid all the high-profile data breaches and ransomware attacks on IT systems in recent years, the threat to business-critical operational technology (OT) is still often underestimated. Yet attacking ...
One team quotes Shakespeare. The other speaks in Morse Code. Now, imagine forcing them to write a play together. Yet IT and OT organizations are being asked to work as one. Is full integration really ...
Securing both information technology (IT) and operational technology (OT) in manufacturing isn't just a technical challenge; it's a shift in mindset. IT has long been responsible for protecting data ...
Education and awareness remain key to defending against cyberattacks against systems that disrupt operations or cause physical harm. Preventing cyber-physical attacks is not an impossible feat, but it ...
Legacy OT systems and shared credentials remain major security gaps not fully addressed by federal guidance, making them prime targets for cyber attackers. Modern authentication methods — such as ...
The convergence of IT and operational technology (OT) systems is expanding the attack surface and exposing critical infrastructure to new threats. That was the central theme of a high-level panel ...
Operational Technology (OT) security has come a long way, but the challenges have only grown with time. Early on, OT systems were completely isolated from external networks, making them inherently ...
Converged IT and operational technology (OT) systems were targeted in 75% of cyber incidents impacting manufacturing firms in the past 12 months. A new report by Telstra International and Omdia ...
Traditional attempts to merge IT/OT threat detection, network segmentation, and secure remote access are impractical in today’s world, Cisco exec says. Cisco has plans to deliver the same network and ...
In this conversation with Dark Reading Editor-in-Chief Kelly Jackson Higgins, Carmine Valente, deputy CISO of New York-based electric utility Con Edison, discusses the rapidly evolving landscape of IT ...
An IT/OT network assessment compiles a full inventory of connected assets, maps communication paths, and pinpoints performance and cybersecurity gaps within a manufacturing facility’s OT network. This ...