Operational Technology (OT)

Article

Tata Power Attack Linked to Bug in Nearly 20-Year-Old Server

Mihir Bagwe  •  November 23, 2022

Article

More State-Sponsored OT Hacking To Come, Says ENISA

Akshaya Asokan  •  November 3, 2022

Webinar

Live Webinar | 10 Ways Asset Visibility Builds an Effective OT Cybersecurity Foundation

Elan Alvey, Senior Industrial Consultant, Dragos, Inc. , Markus Mueller, Principal Industrial Consultant, Dragos, Inc.  •  October 19, 2022

Article

Biden Administration Ramps Up Cybersecurity Requirements

David Perera  •  October 13, 2022

Whitepaper

Uncover Operational Technology Threats with Data Collection

Mandiant  •  October 6, 2022

Article

OT Security Shorted by Nuclear Weapon Oversight Agency

Prajeet Nair  •  September 26, 2022

Article

CISA Plans Grants, Info-Sharing for Small OT Security Shops

Cal Harrison  •  September 15, 2022

Interview

Protecting Industrial Security When Uptime Is Essential

Steve King  •  September 9, 2022

Article

Increasing Your Cyber Maturity Level on a Limited Budget

Anna Delaney  •  September 7, 2022

Article

Proof of Concept: Key Steps for Improving OT Security

Anna Delaney  •  September 7, 2022

Article

New Survey Shows 6 Ways to Secure OT Systems

Cal Harrison  •  September 7, 2022

Article

FortiGuard Labs Threat Report: Shifts in Attack Techniques

Tom Field  •  August 18, 2022

Blog

Comedy of Errors: Ransomware Group Extorts Wrong Victim

Mathew J. Schwartz  •  August 16, 2022

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.