


Why You Should Incorporate OT in Your Security Operations Center
Welcome to part two in my blog series on operational technology (OT) digital transformation (you can read Part 1 here). In my last post, I covered the important steps of gaining asset visibility and anomaly detection through the use of AI and machine learning. In this...
Digital Transformation’s Impact on Operational Technology Security
With industrial sectors such as energy, oil & gas, and manufacturing rapidly digitizing their operations to remain competitive, executives are sharpening their focus on enterprise-wide cybersecurity. Converging IT and operational technology (OT) exposes many...
New Research Uncovers 5 Vulnerabilities in Mitsubishi Safety PLCs
Vulnerabilities in Mitsubishi Safety PLCs were discovered by Nozomi Networks Labs. As no patches are available, we outline general mitigations that can be used to protect operational environments. The Nozomi Networks Threat Intelligence service also includes detection logic for these vulnerabilities.

PrintNightmare: How To Check If Your Systems Are Still Vulnerable
PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).