EXCLUSIVE
Intelligence & Analytics October 27, 2021

The Weaponization of Operational Technology

Contributed to this research: Adam Laurie and Sameer Koranne. Given the accelerating rise in operational technology (OT) threats, this blog will address some of the most common threats IBM Security X-Force is observing against organizations with OT networks, including ransomware…

Read more
Latest Articles
More articles
Latest Articles
More articles
Web Stories
26:10
Developing a Cloud Security Strategy
26:10
Training with Chaos Engineering
32:23
Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report
24:22
Contextualizing Zero Trust
27:05
Recent Activity from ITG16, a North Korean Threat Group
17:59
Consumer Identity and Access Management (CIAM): Reducing Friction Without Reducing Security
25:27
Exploring the Impact of the ITG08 Threat Group
27:03
Creating AI Without Bias
35:54
Current Trends in the Threat Intelligence Landscape
32:54
Verify to Simplify: Demystifying Zero Trust
34:38
More Articles
More articles
Data breach costs hit record highs Ransomware: What you don’t know Getting started with zero trust Cybersecurity in the age of COVID Ransomware rules
Data breach costs hit record highs Ransomware: What you don’t know Getting started with zero trust Cybersecurity in the age of COVID Ransomware rules