
Sandeep Lota
Articles
-
Jan 12, 2025 |
industrialcyber.co | Anna Ribeiro |Christina Hoefer |Sandeep Lota |Zakhar Bernhardt
The evolving landscape of cyber-physical security brings unique challenges to IT (information technology) and OT (operational technology) environments that transcend traditional IT risks. The heightened risks from the industrial Internet of Things (IIoT) and automation necessitate robust strategies for protecting interconnected systems.
-
Dec 19, 2024 |
industrialcyber.co | Sandeep Lota
A security operations center (SOC) is the nerve center of a network, monitoring traffic, devices, anomalies and alerts so analysts can investigate and mitigate incidents and remediate issues. Whether in-house or through a managed security services provider (MSSP), the team comprises security analysts and engineers who protect essential assets and operations while ensuring compliance with industry and government regulations. Traditional SOCs focused only on IT networks.
-
Dec 8, 2024 |
industrialcyber.co | Anna Ribeiro |sarah jane Freeman |Nav Sharma |Ilan Barda |Sandeep Lota |Joe Weiss
Aligning risk and consequence-based approaches across IT and OT environments is crucial for robust cybersecurity. In assessing risk and consequence, IT and OT systems present unique challenges. IT environments typically focus on data integrity and confidentiality, while OT systems prioritize operational continuity and safety. This divergence necessitates a comprehensive strategy considering both domains’ specific risks and consequences.
-
Oct 31, 2024 |
industrialcyber.co | Sandeep Lota
From commodity malware to nuisance worms to sophisticated, targeted attacks, organizations need to protect themselves by reducing exposure to cybersecurity threats. Threats can range from something well-known and understood that somehow lingers on the network to a novel attack targeting control system functionality, intended to cause real-world harm. A useful tool for understanding and knowing how to detect cybersecurity threats, including OT cybersecurity threats, is the Known-Unknown Matrix.
-
Oct 2, 2024 |
industrialcyber.co | Sandeep Lota
Identifying your organization’s critical business functions is foundational to all kinds of strategic planning initiatives. Every organization has a definitive list that they review at least annually, right? Not so much, it turns out. Most lists of critical business functions are too high-level to be actionable.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →