Topic: operational technology

  • Secure OT Systems: The Power of Strong Passwords

    Secure OT Systems: The Power of Strong Passwords

    Operational technology (OT) secures critical physical infrastructure, but its security often lags behind IT, creating high risks of physical damage and public safety threats from cyberattacks. OT security is uniquely challenged by outdated systems, IT/OT network convergence, and shared credential...

    Read More »
  • EU Cyberattacks Increasingly Target Critical Infrastructure

    EU Cyberattacks Increasingly Target Critical Infrastructure

    The ENISA Threat Landscape 2025 report reveals a significant increase in cyberattacks targeting operational technology systems, which now account for 18.2% of all documented threats, driven by their growing interconnectedness and deliberate targeting by malicious actors. Pro-Russian hacker groups...

    Read More »
  • Polish Energy Grid Hit: Cyberattack Disrupts 30 Facilities

    Polish Energy Grid Hit: Cyberattack Disrupts 30 Facilities

    A sophisticated cyberattack in late December compromised operational technology at numerous Polish energy facilities but failed to cause widespread power outages, highlighting a serious escalation in threats to critical infrastructure. The attack, attributed with moderate confidence to the Russia...

    Read More »
  • Industrial Cyberattacks Surge: Critical Infrastructure at Risk

    Industrial Cyberattacks Surge: Critical Infrastructure at Risk

    Critical infrastructure faces a severe and growing cyber threat, with vulnerability disclosures for industrial systems nearly doubling in a single year, highlighting a major risk to essential services like energy and utilities. Research shows a dramatic spike to 2,451 disclosed vulnerabilities in...

    Read More »
  • US & Australia Release AI Security Guidelines for Infrastructure

    US & Australia Release AI Security Guidelines for Infrastructure

    U.S. and Australian cybersecurity agencies have released joint guidelines to help critical infrastructure operators securely integrate AI tools, like machine learning models, into operational technology systems while managing new risks. The framework emphasizes key principles, including conductin...

    Read More »
  • Nozomi Networks Automates Critical Infrastructure Cybersecurity

    Nozomi Networks Automates Critical Infrastructure Cybersecurity

    Nozomi Networks has launched automated threat prevention in its Nozomi Arc platform, providing the industry's first safe, automated response solution tailored for operational technology environments. The platform offers flexible prevention modes, integrates OT-specific threat intelligence, and se...

    Read More »
  • Siemens Simplifies OT Security with Encrypted Virtual Networks

    Siemens Simplifies OT Security with Encrypted Virtual Networks

    Siemens has launched SINEC Secure Connect, a zero trust security platform designed specifically for operational technology (OT) environments to establish encrypted virtual networks and secure remote access without traditional VPNs. The platform addresses security gaps in merging IT and OT systems...

    Read More »
  • Pro-Russia Hackers Target Water Utility in Honeypot Sting

    Pro-Russia Hackers Target Water Utility in Honeypot Sting

    A Russia-aligned hacktivist group called TwoNet was tricked into attacking a decoy water treatment facility, revealing their shift from website disruptions to targeting industrial infrastructure. The group used default credentials to access the system, performed disruptive actions like deleting c...

    Read More »
  • Your Security Strategy Is Failing Before It Begins

    Your Security Strategy Is Failing Before It Begins

    Cybersecurity must be treated as a core business risk management function, not just a technical issue, and integrated with business objectives from the start to ensure meaningful protection and executive support. A successful strategy requires first identifying critical assets and risks before de...

    Read More »
  • Rethink Network Visibility for Australia's Critical Infrastructure

    Rethink Network Visibility for Australia's Critical Infrastructure

    Government agencies in Australia and the Asia Pacific face escalating cybersecurity threats due to the deep integration of digital and physical infrastructure, making public services like transportation and healthcare prime targets for sophisticated attacks. The convergence of IT and OT systems, ...

    Read More »
  • Quantify Cyber Risk to Win Executive Buy-In

    Quantify Cyber Risk to Win Executive Buy-In

    CISOs should translate cyber risks into financial terms to secure executive approval for security budgets by demonstrating potential monetary losses and investment returns. The evolving threat landscape includes AI-driven attacks and defenses, requiring constant vigilance and adaptation in cybers...

    Read More »
  • Open Science in Cybersecurity: Real-World Impact

    Open Science in Cybersecurity: Real-World Impact

    Scientific research environments prioritize system availability over strict confidentiality, requiring a fundamental shift from standard enterprise cybersecurity models to balance data protection with global collaboration. A key challenge is securing legacy and custom-built scientific infrastruct...

    Read More »
  • Google Warns of Rising Cyber-Physical Attacks in Europe

    Google Warns of Rising Cyber-Physical Attacks in Europe

    Google Cloud Security forecasts a major increase in cyber-physical attacks on Europe's critical infrastructure by 2026, targeting sectors like energy, transportation, and digital systems, which threatens public safety and economic stability. State-sponsored cyber espionage from countries such as ...

    Read More »
  • Albireo PCS: Secure Managed Cloud vs On-Premise Servers

    Albireo PCS: Secure Managed Cloud vs On-Premise Servers

    Albireo Energy's Private Cloud Services (PCS) is a secure, managed cloud platform for Building Automation and Energy Power Management Systems, offering an alternative to on-premise servers that reduces capital investment and security risks. PCS separates operational technology from IT infrastruct...

    Read More »
  • AI Security: Outsmart Evolving Cyber Threats

    AI Security: Outsmart Evolving Cyber Threats

    Organizations face increasingly sophisticated cyber threats that require proactive, AI-enhanced security measures to anticipate and block novel attacks before they cause damage. AI-powered systems revolutionize security workflows by processing vast datasets to eliminate false positives, highlight...

    Read More »
  • Cybersecurity Is Now a C-Suite Priority, Not Just IT

    Cybersecurity Is Now a C-Suite Priority, Not Just IT

    Cybersecurity is now a top strategic business priority, fundamentally shaping technology adoption, talent strategy, and long-term planning across all sectors. Organizations are responding by integrating security into enterprise risk management, increasing business continuity planning, and heavily...

    Read More »
  • Romanian Water Authority Hit by Major Ransomware Attack

    Romanian Water Authority Hit by Major Ransomware Attack

    A ransomware attack disrupted administrative systems at Romania's national water authority, but crucial operational technology controlling physical water infrastructure like dams remained unaffected and functional. The attackers used the legitimate Windows BitLocker feature to encrypt files, leav...

    Read More »
  • UK Warns of Ongoing Russian Hacktivist Cyber Attacks

    UK Warns of Ongoing Russian Hacktivist Cyber Attacks

    The UK's NCSC warns that Russian-aligned hacktivist groups are persistently targeting critical infrastructure and government with disruptive DDoS attacks, causing significant operational and financial harm. A key group, NoName057(16), uses a crowdsourced "DDoSia" platform to launch distributed at...

    Read More »
  • Australia's 2024-2025 Cyber Threat Report Reveals Key Security Trends

    Australia's 2024-2025 Cyber Threat Report Reveals Key Security Trends

    Australia is experiencing a sharp increase in cybersecurity threats, driven by its growing reliance on internet-connected technology and targeting by both criminal and state-sponsored actors, leading to significant financial losses and a rise in incidents. State-backed cyber actors and cybercrimi...

    Read More »
  • BeyondTrust RCE exploited post-patch, United CISO on resilience

    BeyondTrust RCE exploited post-patch, United CISO on resilience

    Cybersecurity resilience requires proactive continuity and modernization, especially for interconnected organizations facing rapidly exploited vulnerabilities like the BeyondTrust flaw (CVE-2026-1731) and zero-days used in high-stakes breaches. Major software vendors, including Microsoft and Appl...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs in November 2025

    Hiring Now: Top Cybersecurity Jobs in November 2025

    The global demand for skilled cybersecurity professionals is rising, with November 2025 offering diverse roles across specializations like application security, cloud infrastructure, and governance to address evolving digital threats. Positions span various countries and work arrangements, includ...

    Read More »
  • Jaguar Land Rover Faces $2.5 Billion Cyberattack Fallout

    Jaguar Land Rover Faces $2.5 Billion Cyberattack Fallout

    The cyberattack on Jaguar Land Rover is the UK's most financially damaging cyber incident, costing the nation an estimated £1.9 billion and disrupting over 5,000 organizations. The attack forced a month-long production shutdown, leading to a £1.5 billion government loan guarantee to help the comp...

    Read More »
  • Cybersecurity's Triple Threat: AI, Quantum, Geopolitics

    Cybersecurity's Triple Threat: AI, Quantum, Geopolitics

    Geopolitical tensions and emerging threats are elevating cybersecurity to a top strategic priority, prompting organizations to reassess infrastructure and partnerships. Despite increased budgets and AI investments, low confidence in resilience persists due to legacy systems, reactive spending, an...

    Read More »
  • CISA Unveils Post-Quantum Cryptography Product List

    CISA Unveils Post-Quantum Cryptography Product List

    CISA has released its first official list of product categories supporting post-quantum cryptography (PQC), providing a roadmap for organizations to prepare for quantum computing threats to current encryption. Developed with the NSA, the list highlights key technology areas like cloud services, w...

    Read More »
  • Asahi Cyber-Attack: 1.5 Million Customers' Data Breached

    Asahi Cyber-Attack: 1.5 Million Customers' Data Breached

    The Asahi Group suffered a major cybersecurity breach in September 2025, compromising personal data of nearly two million individuals, including names, addresses, and contact details, but not credit card information. The ransomware attack by the Qilin group caused significant operational disrupti...

    Read More »
  • JLR Hack Costs UK Economy £1.9 Billion in Record Loss

    JLR Hack Costs UK Economy £1.9 Billion in Record Loss

    A sophisticated cyber-attack on Jaguar Land Rover in August 2025 caused a £1.9 billion loss to the UK economy, the nation's most financially damaging security breach, affecting over 5,000 organizations. The Cyber Monitoring Centre classified it as a severe "Category 3" systemic event, with the pr...

    Read More »