Should You Worry About Cyber Insurance?

Should You Worry About Cyber Insurance?

Today, we’re exploring a question many business leaders have been working to navigate: “Is cybersecurity insurance worth the investment?”The first cyber insurance policy came into existence in 1997.It was pretty humble, designed to help retailers insulate…

Cybersecurity threats pose a major risk to production targets

Cybersecurity threats pose a major risk to production targets

Ransomware against industrial entities increased by 500 percent from 2018 to 2020, a trend that is likely to continue into the future. External threats range from foreign nations to financially motivated cybercrime, and both look increasingly…

A Good Plan Links Asset Visibility and Threat Detection

A Good Plan Links Asset Visibility and Threat Detection

The escalating reliance on technology and connectivity in industrial critical infrastructure has brought about efficiency and convenience. However, this efficiency and convenience exposes critical infrastructure to numerous cyberthreats and approaches, making robust cyber defense measures more…

Securing the ICS Software Supply Chain

Securing the ICS Software Supply Chain

In today’s interconnected world, the security of industrial control systems (ICS) is of utmost importance. The risk of software backdoors in the ICS software supply chain is a growing concern that needs to be addressed. In…

What could an OT cyberattack cost you?

What could an OT cyberattack cost you?

If there’s one thing every operator, plant manager and OT expert knows, it’s that downtime is never an option. While no company likes to have its IT systems and data on lockdown, there can be devastating…

Understanding OT-Native Cybersecurity

Understanding OT-Native Cybersecurity

Dave Purdy, OT Cybersecurity Specialist at TXOne, was recently interviewed by ARC’s Vice President, Cybersecurity Services Sid Snitkin at the 2023 ARC Forum, held in Orlando, Florida. We encourage you to view this valuable discussion, as…

Protecting against new types of threats and attack vectors

Protecting against new types of threats and attack vectors

Following on from the first part of this article entitled, ‘Readying Industrial IoT Networks for Today’s Security Challenges’, which reviews the standardized way to approach security, this article goes through ways to protect against new and…

Readying IIoT Networks for Today’s Security Challenges

Readying IIoT Networks for Today’s Security Challenges

Cyber attacks can often seem like the opening scene of a science fiction movie. The mouse pointer starts gliding across a screen with purpose. A technician, looking up to review data on their monitor, sits motionless,…