Articles

December 3, 2022

8 steps to build a defensible OT network.
8 Steps to Build a Defensible OT Network

How to Build a Defensible OT Network 1. Assessment Although vulnerability assessment and risk assessment are commonly used interchangeably, but they are two different approaches, and both are needed as part of a comprehensive security assessment. Another misconception is that security assessment is a network anomaly detection tool like Nozomi Networks, Claroty or Tenable. Any…

View details
Top 5 Key Cultural Differences Between IT and OT.
Top 5 Key Cultural Differences Between IT and OT

IT and OT Cultural Differences Why It’s Imperative to Bridge the IT & OT Cultural Divide We hear it all the time from security marketers and evangelists alike. “Information technology and operational technology are converging!” It’s a simplistic way of characterizing what is a highly complex web of digital transformations affecting a broad range of…

View details