U.S. and international agencies Jan. 14 released guidance on secure connectivity for operational technology environments.
Fortinet's 2025 State of Operational Technology and Cybersecurity Report shows a strong correlation between OT security maturity and reduced impact from intrusions. What practical steps are ...
Join CISA and partners as they discuss the Foundations for Operational Technology (OT) Cybersecurity: Asset Inventory Guidance for Owners and Operators, developed in collaboration with federal ...
The SEC's 2026 examination priorities reveal a significant shift: Concerns about cybersecurity and AI have displaced ...
Image by Couleur from Pixabay. By Nathan Brown Senior Enterprise Architect, 1898 & Co. By Kevin Huff, Senior Enterprise Architect, 1898 & Co. Many states have already set aggressive decarbonization ...
Remote privileged access management company Cyolo Ltd. today announced the launch of Cyolo PRO, for privileged remote operations, a new hybrid secure remote access solution for operational technology ...
At a time when the global manufacturing marketplace landscape is more competitive than ever, growing numbers of manufacturers are adopting game-changing technologies to overcome complex new challenges ...
WASHINGTON — A coalition of U.S. and international government agencies released a new set of guidelines designed to secure the integration of artificial intelligence (AI) into operational technology ...
“Operational technology is now a front-line target for ransomware, nation-state attacks, and supply chain vulnerabilities, but the training available to defend it has historically lagged behind,” said ...
Witnesses' calls for better investment in securing such systems come just two months before a key cybersecurity information-sharing law is set to expire. Critical Infrastructure Congress CISA Cyber ...
Industrial control system cybersecurity company Dragos Inc. today announced the launch of Dragos Platform 3.0, the latest update to its platform that delivers new capabilities that empower industrial ...
Uncontrolled use of remote access tools is posing a threat to operational technology, security researchers have warned. Team82, the research arm of cyber and physical security company Claroty, found ...