The convergence of information technology (IT) and operational technology (OT) to secure the Internet of Things (IoT), the Industrial IoT (IIoT), and OT solutions will eventually follow the route towards continuous surveillance that the IT world navigated over the past two decades.Read More
Tragically, the hackers have won yet again defeating security professionals, processes, and technology. The recent wave of successful cybersecurity attacks on key U.S. agencies, large organizations, and security companies underscores the fundamental inadequacies of the detection and forensic analysis (post breach) tool chest that is pervasive in the information technology (IT) industry today.Read More
As we approach the end of an unforgettable year, all industries are recovering from the aftereffects of the global pandemic and contemplating the meaning and purpose of digital transformation. The goals of OT/IT (operational technology/information technology) convergence are far from cohesive, the associated investment costs remain constraining, and pathways to revenues appear fluid – for key stakeholders to commit to and execute on a roadmap. The collaborative nature of such an endeavor to transform legacy systems in critical infrastructure crammed with heterogeneous brownfield and greenfield devices is a daunting prospect. It will require equipment manufacturers, service providers, cloud platform vendors, and device owners/operators to agree on fundamental aspects of change (whose turf is this to lead the charge?).Read More
Across all the major industry sectors, chief risk officers, product managers, solution architects and subject matter experts have to confront the economic, political, intellectual and commercial challenges of industrial and non-industrial IoT with a subjective assessment of the following fundamental introspections.Read More
Digital transformation of traditional original equipment manufacturer (OEM) product and solution offerings requires hardening of connected and edge devices with a horizontal platform that provides a "single pane of glass" for operational technology (OT) security.
Deploying greenfield devices in traditional network silos alongside legacy brownfield devices in OT environments introduces major risks and exposes a huge attack surface for cyber warfare.Read More