[New report] The State of OT Security and the Cyber Supply Chain

[New report] The State of OT Security and the Cyber Supply Chain

In March 2021, the Enterprise Strategy Group completed a research survey of 150 senior information technology (IT), cybersecurity, and operational technology (OT) professionals directly knowledgeable about their organization’s OT security practices. Organizations represented were from verticals…

2021 State of Operational Technology and Cybersecurity Report

2021 State of Operational Technology and Cybersecurity Report

The 2021 State of Operational Technology and Cybersecurity Report from Fortinet finds that operational technology (OT) leaders continue to face cybersecurity challenges, some of which were exacerbated by the shift to work from home due to…

eBook: Manufacturing Cybersecurity Case Studies

eBook: Manufacturing Cybersecurity Case Studies

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several…

White Paper: The State of Industrial Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time.…

Protecting IT and OT Resources Against Advanced Threats in Manufacturing

Protecting IT and OT Resources Against Advanced Threats in Manufacturing

Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical…

Cybersecurity for Shared Cloud Environments

Cybersecurity for Shared Cloud Environments

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are…