ISA/IEC 62443

The Takepoint Research report indicates a significant shift towards adopting the Zero Trust model in OT, with 72% of professionals integrating it to boost security and efficiency. It highlights secure remote access as a key application, aligning with goals to reduce risk and enhance operations. Moreover, it points out the need for collaborative efforts across organizational roles to implement Zero Trust effectively, aiming to improve productivity and security.
Xage-Takepoint Research report reveals growing adoption of zero trust security in industrial enterprises
Manufacturing Cybersecurity - Regulations and Standards
Manufacturing Cybersecurity – Standards, Regulation and Compliance
2024.01.07 Rising significance of OT asset visibility in cybersecurity resilience across critical infrastructure
Rising significance of OT asset visibility in cybersecurity resilience across critical infrastructure
Cybersecurity Strategies and Best Practices for Manufacturing
Cybersecurity Strategies and Best Practices for Manufacturing
Cyber Risk in Manufacturing - A Closer Look
Cyber Risk in Manufacturing – A Closer Look

Industrial Cyber Experts

Jonathon Gordon
Manufacturing Cybersecurity – Standards, Regulation and Compliance
Welcome back to our journey through the dynamic and evolving world of cybersecurity in modern manufacturing. In part... Read full story
Danielle Jablanski
Preserving Integrity in OT Systems to Defend Against Living off the Land Techniques
Living-off-the-land (LotL) techniques may reduce the time and resources required to exploit or corrupt systems – abusing stolen... Read full story
Sourabh Suman
Addressing ICS cybersecurity training amid rising adversarial threats and evolving tactics
The evolving threat landscape has emphasized the importance of focusing on gaining knowledge and training in industrial control... Read full story
Sinclair Koelemij
The Mental Miser of the OT Security World – Overcoming Fear to Redefine Concepts
How feasible is it to evolve and reconsider concepts within the field of OT security? Our approach to... Read full story