Hear about key findings from our State of Operational Technology and Cybersecurity Report, learn more about the types of threats facing operational technology, and discover how OT teams can mitigate them.
OT networks can cover huge amounts of real estate and span a variety of network segments. Protection requires broad, integrated, and automated security systems that can see and respond to threats immediately, anywhere across the extended network.
The Operational Technology (OT) networks (such as industrial control and supervisory control and data acquisition systems [ICS/SCADA]) that run today’s modern society are a collection of devices designed to work together as an integrated and homogenous system. If one of these systems fails, it can have a catastrophic domino effect. For example, electricity requires telecommunications to transfer information on wheeling power from the electrical grid.
Welcome back to our monthly review of some of the most interesting security research publications.
The Internet of Things (networks of uniquely identifiable endpoints, or "things," that communicate without human interaction using embedded IP connectivity) is the next industrial revolution. Estimates say there will be 24 Billion IoT devices installed by 2020, and $6 Trillion will be invested in IoT devices over the next 5 years. With that kind of growth and investment, protecting each of these “things” and their corresponding interactions with other components, including our networks, will be critical. So where is this...