Australia's leading source of security and threat news
These search results are from across the Techday Network of sites
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
Nozomi Networks and The Missing Link team up to deliver industrial cybersecurity solution
Threat actors are increasingly targeting industrial control systems (ICS) in manufacturing and critical infrastructure.
Managing OT cybersecurity vulnerabilities at industrial facilities – PAS Global
Focusing on Level 2 endpoints gives only a surface view because they make up only 20 percent of endpoints that exist in process control networks.
Exclusive: How nation-state attacks impact businesses
With tensions between global superpowers rising, cyber attacks have become a new frontier for governments to gain an advantage over one another.
Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0
The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.
ForeScout deepens visibility into OT networks with industrial system integrations
New partnerships with Indegy and SecurityMatters continue to forward ForeScout’s strategy to secure the extended enterprise.
Tenable launches solution to secure infrastructure across converged IT/OT environments
Converged environments contain a mix of IT and OT devices and systems that demand a holistic approach to cybersecurity.
Insights on industrial vulnerability: How secure is your OT infrastructure?
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
Two thirds of A/NZ businesses concerned about IoT and OT security
Enterprises across the globe are worried about the impact of Internet of Things (IoT) technology and operational technology (OT).
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?