As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.
Let's talk operational technology security: How can companies devise a winning OT security strategy to bridge the physical/digital divide?
A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.
Organizations are increasingly failing to secure internet-facing industrial control systems (ICS) that manage critical infrastructure, putting them at risk of ICS-specific malware.
Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.
Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.
Nuclear power plants are now being targeted by sophisticated cybercrime groups. Is this the precursor to a full-scale malware meltdown?
To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
Today's IT professionals can extract many lessons from the infamous Stuxnet worm, which was discovered in 2010, to help them protect their SCADA systems.