In the face of digital transformation, security has emerged as the domain that is suffering the most. New digital environments are highly elastic and in a constant state of flux, which means that ...
In the world of critical infrastructure, there are typically two categories of computing technologies: Information Technology (IT) and Operational Technology (OT). You could think of IT as the servers ...
Stop managing risk in silos. VM-Native OT Discovery, now available in Tenable Vulnerability Management and Tenable Security ...
IT and OT are frequently grouped under the cybersecurity umbrella, but they function in fundamentally different ways.
Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations in selecting the most suitable operational ...
The exploding demand for remote access into today's industrial control systems (ICS) and operational technology (OT) systems has created a nebulous, Internet-connected attack surface that's too ...
Survey numbers aren’t surprising, according to Gartner expert, who says CISOs should work more closely with the OT side. In May 2020, Iranian attackers attempted to alter chlorine levels in drinking ...
Question: Can I use the same security tools on my IT and OT? Sean Tufts, practice director, product security, ICS and IoT, Optiv: You can absolutely leverage information technology and operational ...
Doros Hadjizenonos, Regional Sales Director for Fortinet in South Africa. As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their ...