Operational Technologies (OT) stories - Page 2
Critical flaw found in IDIS Cloud Manager CCTV viewer
Last week
#
ot
A critical ICM Viewer flaw lets a single malicious click hijack IDIS CCTV hosts, exposing Australian networks to deep lateral attacks.
ITSEC Asia chief wins APAC CEO award for AI cyber push
Last month
#
ot
ITSEC Asia boss Patrick Dannacher wins APAC CEO of the Year for steering an AI-led cyber platform shift and regional security expansion.
Mitsubishi Electric seals USD $1bn Nozomi Networks deal
Last month
#
ot
Mitsubishi Electric completes USD $1bn purchase of OT and IoT security specialist Nozomi Networks, which will continue to run independently.
AI-fuelled cyber attacks surge 70%, Check Point warns
Last month
#
ot
AI-driven hacking has pushed weekly cyber attacks up 70% since 2023, with Check Point warning campaigns are faster, broader and harder to stop.
NETSCOUT boosts observability with Wi-Fi 7, SSL tools
Last month
#
ot
NETSCOUT equips nGeniusONE and Edge Sensors with Wi-Fi 7 and deeper SSL/TLS visibility to tackle remote-site blind spots and expiry risks.
Kingston gains FIPS 140-3 Level 3 for IronKey USBs
Last month
#
ot
Kingston wins FIPS 140-3 Level 3 for its IronKey Keypad 200 USBs, making it the first supplier with three drives at this stringent standard.
Snowflake unveils AI data tools tailored to energy firms
Last month
#
ot
Snowflake launches Energy Solutions for its AI Data Cloud, unifying IT, OT and IoT data to boost grid reliability and cut emissions.
Nike probes suspected cyberattack & huge data leak
Last month
#
ot
Nike is probing a suspected cyberattack after a hacker group claimed to leak 1.4TB of internal data, raising supply chain security fears.
Snowflake unveils AI Data Cloud ‘Energy Solutions’
Last month
#
ot
Snowflake launches Energy Solutions for its AI Data Cloud, unifying energy sector data to modernise grid planning and asset management.
Forrester maps ten edge & IoT trends set to shape 2025
Last month
#
ot
AI at the edge, observability and Zero Trust security head Forrester’s ten edge and IoT trends it says will redefine enterprise tech in 2025.
Cythera appoints Jason Whyte to lead Australian integration
Last month
#
ot
Cythera names Jason Whyte as Australia managing director to integrate Seamless Intelligence and Phronesis Security under one brand.
SonicWall firewalls strengthen security for IoT era
Last month
#
ot
As IoT devices surge, SonicWall firewalls step in to secure sprawling connected networks without slowing performance or innovation.
Radix honoured for digital transformation in industry
Last month
#
ot
Radix wins CIOReview’s Digital Transformation Company of the Year for AI-driven projects boosting efficiency in asset-intensive industries.
Aliter unites trio as Serbus to drive UK security push
Last month
#
ot
Aliter folds three tech firms into Serbus to target UK critical infrastructure security, eyeing GBP £75m revenue within two years.
Snowflake, TVS Next tie up on NexOps for manufacturers
Last month
#
ot
Snowflake and TVS Next partner to run NexOps on Snowflake’s AI Data Cloud, unifying plant and enterprise data for manufacturers.
Claroty raises USD $150m to boost CPS cyber security
Last month
#
ot
Claroty secures USD $150m Series F funding to accelerate global expansion and strengthen cyber-physical systems security platform.
Claroty raises $150m to expand cyber-physical security
Last month
#
ot
Claroty secures $150m in fresh funding to accelerate global expansion of its cyber-physical security platform for critical infrastructure.
Exclusive: e2e-assure CEO on CNI defence from geopolitical cyberattacks
Last month
#
ot
Rob Demain warns that cyber campaigns on critical infrastructure are demanding behaviour-led defence over compliance.
e2e-assure launches unified OT cyber monitoring in UK
Last month
#
ot
e2e-assure rolls out 24/7 unified OT cyber monitoring in the UK, partnering with EmberOT and Trinity OT Security amid rising attacks.
Industrial AI drives new approach to OT cyber security
Last month
#
ot
Industrial AI and IT/OT convergence are forcing factories to abandon closed networks and adopt hybrid, zero trust cyber security architectures.