Companies that are using network monitoring tools, either for analyzing security threats, packet flow or Key Performance Indicators (KPIs) – all have one thing in common. They need to ensure that those applications have access to 100% of...
IT vs OT. Enterprise versus Industrial (ICS). The technologies operate in different environments and have different uses. IT is the arena we all know: computers, keyboards, etc. IT uses a common environment and solutions (the cloud,...
We had a great time together with colleagues and tech partners at the recent FutureCon conference in Baltimore, Maryland, USA. Thought leaders - engineers to executives - shared their perspectives on the current state of cybersecurity. It...
Whilst people often refer to the utilities sector as a “Critical Infrastructure”, the transport and logistics industry should be considered equally as vital. A country’s economy demands the rapid delivery of goods to manufacturers,...
IT and OT networks have converged, new technologies have been deployed, and resources remain constrained. Now more than ever, organizations need a strong security strategy to protect and defend their networks against adversaries. The first...
In April 2021, a ransomware attack shut down the largest pipeline network in the United States. Colonial Pipeline, which supplies almost 50% of the Northeast’s energy needs, lost nearly 100 gigabytes of proprietary data. In light of the...