Articles
-
Dec 8, 2024 |
industrialcyber.co | Anna Ribeiro |sarah jane Freeman |Nav Sharma |Ilan Barda |Sandeep Lota |Joe Weiss
Aligning risk and consequence-based approaches across IT and OT environments is crucial for robust cybersecurity. In assessing risk and consequence, IT and OT systems present unique challenges. IT environments typically focus on data integrity and confidentiality, while OT systems prioritize operational continuity and safety. This divergence necessitates a comprehensive strategy considering both domains’ specific risks and consequences.
-
Jul 24, 2024 |
insight.scmagazineuk.com | Ilan Barda
Understanding OT security and supply chain. In March 2024, the U.S. government sent a letter to Shanghai Zhenhua Heavy Industries (ZPMC), a Chinese-based manufacturer with close ties to the Chinese Communist Party (CCP), demanding answers about cellular modems discovered on Chinese-built cranes deployed in US seaports. The modems were installed during manufacturing, but were not part of the equipment contract and offered no functional benefit to the ports that purchased the cranes.
-
Jul 17, 2024 |
automation.com | Ilan Barda
An effective OT security regimen must be able to secure the entire environment–legacy as well as the latest devices. In a recent survey conducted by ABI Research, three-quarters of industrial organizations reported that they had detected malicious activity within their OT network, and 24% were forced to shut down OT operations within the last year due to a successful attack.
-
Jul 16, 2024 |
automation.com | Ilan Barda
Supply chain security is a serious concern for operational technology (OT) and one that must be addressed immediately. In March 2024, the U.S. government sent a letter to Shanghai Zhenhua Heavy Industries (ZPMC), a Chinese-based manufacturer with close ties to the Chinese Communist Party (CCP), demanding answers about cellular modems discovered on Chinese-built cranes deployed in US seaports.
-
Jul 12, 2024 |
smartindustry.com | Ilan Barda
In a recent survey conducted by ABI Research, three-quarters of industrial organizations reported that they had detected malicious activity within their OT network, and 24% of them were forced to shut down OT operations within the last year due to a successful attack. If that’s not enough to have OT companies looking for new cybersecurity solutions, European Union companies have the added pressure of NIS2’s looming October deadline.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →