CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
OT Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

OT Security

Top view at night on an oil refinery showing cyber-physical OT security of critical infrastructure
Cyber SecurityInsights

How We Will Win the Cyber-Physical Battle for OT Security

November 25, 2022
When industrial environments integrated connected systems into their assets, attack surfaces are expanded, opening once-closed critical infrastructure sites and the companies that manage them to attacks from threat actors.
Read More
Siemens company sign hanging on a building showing encryption keys exposed in industrial devices
Cyber SecurityNews

Hackers Can Extract Private Encryption Keys and Completely Takeover Siemens Industrial Devices

October 20, 2022
Vulnerability allows hackers to extract private encryption keys hardcoded in Siemens industrial devices to execute sophisticated attacks or take over whole product lines.
Read More
Aerial view of factory showing government sector OT security require zero trust
Cyber SecurityInsights

The Steps To Securing Operational Technology in the Government Sector

October 17, 2022
Government agencies, from the municipal to the federal level, have the largest and most varied number of use cases that require a Zero Trust Architecture , because of the range of systems they operate and the weaknesses of OT security.
Read More
Electric substation at dawn showing OT security for critical infrastructure
Cyber SecurityInsights

Digital Defences: Securing OT Assets and Protecting Critical Infrastructure

April 26, 2022
Escalation of cyber-warfare can lead to attacks on operational technology (OT), compromising critical infrastructure and disrupting our way of life. Learn the three-part OT security framework to ensure these assets remain safe and accessible at all times.
Read More
Safety hard hat helmet hanging on factory shelf showing OT security
Cyber SecurityInsights

How To Stop a Shutdown Before It Happens: The Importance of OT Security, Monitoring, and Response

July 28, 2021
In a world where a single OT security breach can shut down an entire coastline’s worth of equipment, being prepared early will save your organization time and costs while helping to prevent major logistical headaches.
Read More

Latest

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results