Admin

Admin

Popular

What Makes IEC 62443 FR1 a Top Priority for OT Security This Year
What Makes IEC 62443 FR1 a Top Priority for OT Security This Year
Jul 11 2025

When it comes to OT (Operational Technology) security, standards don’t usually make headlines. But...

Read More
When Cyber Threats Reach Industrial Systems It’s Already Too Late
When Cyber Threats Reach Industrial Systems It’s Already Too Late
Jul 04 2025

The convergence of IT and OT systems has brought greater efficiency, visibility, and automation to...

Read More
Why OT Organisations Can’t Afford to Ignore Endpoint Security Anymore
Why OT Organisations Can’t Afford to Ignore Endpoint Security Anymore
Jun 13 2025

Ransomware may start in IT, but it doesn’t always stop there. In recent years, critical...

Read More
The OT Security Gap Behind the French Hospital Attack
The OT Security Gap Behind the French Hospital Attack
May 26 2025

On a winter morning in 2024, several hospitals across France were forced into emergency...

Read More
Iberian Blackout Shows Why OT Cybersecurity Can’t Be an Afterthought
Iberian Blackout Shows Why OT Cybersecurity Can’t Be an Afterthought
Apr 30 2025

In late April 2025, Spain and Portugal were hit by one of the most extensive power outages in...

Read More
Why Securing Distributed Control Systems Is No Longer Optional
Why Securing Distributed Control Systems Is No Longer Optional
Apr 15 2025

The distributed control system (DCS) is the core of industrial automation. It synchronises...

Read More
Why Revolutionary Security Solutions Often Struggle in OT Environments
Why Revolutionary Security Solutions Often Struggle in OT Environments
Apr 10 2025

In the age of digital transformation, cybersecurity has become a boardroom topic across...

Read More
Evaluating PKI and OTAC for Secure Operational Technology
Evaluating PKI and OTAC for Secure Operational Technology
Mar 24 2025

The ubiquity of Public Key Infrastructure (PKI) in securing our digital world is undeniable. From...

Read More
Why Are Cyberattacks on OT Systems More Dangerous Than IT Breaches?
Why Are Cyberattacks on OT Systems More Dangerous Than IT Breaches?
Mar 13 2025

When people think of cyberattacks, they often picture stolen data, financial fraud, or personal...

Read More
Securing OT: Moving Beyond Passwords with swIDch's OTAC
Securing OT: Moving Beyond Passwords with swIDch's OTAC
Feb 25 2025

In the realm of Operational Technology (OT), the security measures applied to protect critical...

Read More

Featured

When a Cyberattack Tests the Limits of Automotive OT Security
When a Cyberattack Tests the ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter