Operational Technology

Fresh Summer Articles for Healthcare IAM Professionals

Fresh For Summer: Articles for Healthcare IAM Professionals

The summer continues with more cyber attacks, cyber insurance premiums rising, and the medical device sector is feeling the crush in this week’s digest of articles for Healthcare IAM professionals. Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would […]

Fresh For Summer: Articles for Healthcare IAM Professionals Read More »

9 Top Articles on Cybersecurity & Identity Management

Top Stories on Digital Identity Management, ICS Attacks, and the Dangerous Data Your Smartphone Leaks. Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this via email (and a

9 Top Articles on Cybersecurity & Identity Management Read More »

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program

The Secret of Successful Vulnerability Management Programs Read More »

14 Must-Read IDAM and Cybersecurity Articles, October 2016

Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide

14 Must-Read IDAM and Cybersecurity Articles, October 2016 Read More »

2 Critical Considerations for Integrating OT/IT Integration

OT/IT Integration success can be attributed to three key elements: people, process, and technology. The integration of OT and IT environments is a challenging project for any organization. To help bring simplicity to this complex undertaking, an OT/IT integration can be analyzed through the lens of the cybersecurity triangle – people, process, and technology. These

2 Critical Considerations for Integrating OT/IT Integration Read More »

3 Essential Elements for IT/OT Integration Success

IT/OT Integration success can be attributed to three key elements: people, process, and technology. According to the U.S. Department of Homeland Security, operational technology (OT) operators were the most targeted sector of industrial cyber-attacks in 2015, making IT and OT integration more important than ever for industrial businesses. The introduction of networks into the industrial space

3 Essential Elements for IT/OT Integration Success Read More »

Top 10 Identity Management & Cybersecurity Articles, August 2016

Every two weeks we curate the top Identity Management and Cybersecurity articles from around the industry. Today’s digest covers topics from OT/IT collaboration to DDoS and ransomware to biometrics and digital identity. Check out these 10 must-read IAM and cybersecurity articles from early August 2016. If you would prefer to receive an even shorter digest, please subscribe

Top 10 Identity Management & Cybersecurity Articles, August 2016 Read More »

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many

Overcoming Operational Technology (OT) and IT Integration Challenges Read More »

Scroll to Top