Vulnerability intelligence tools can be very useful to prioritize the key threats security professionals need to take action on for...more


Vulnerability intelligence tools can be very useful to prioritize the key threats security professionals need to take action on for...more

Image: JustSuper/Adobe Stock There is no denying the impact of ransomware attacks inside organizations is massive — and yet, protection...more
Operational technology (OT) is essential to today’s industrial processes and equipment, not least of which in the energy sector. The...more
The 2022 State of Operational Technology and Cybersecurity Report, now in its fourth annual iteration, finds that organizations are still...more
Cyberattacks are a growing threat to water utilities. Recent incidents have garnered media attention as potential threats to water systems...more
IT/OT cybersecurity is the protection of Operational Technology (OT) used for process control. In the Purdue Model this relates to...more

Image: Monster Ztudio/Adobe Stock Data privacy is a growing concern for consumers. In a recent survey by KPMG, consumers reported...more

Mike Arrowsmith, chief trust officer at NinjaOne, makes the case for a permanent shift in the way businesses conduct remote...more

Image: FellowNeko/Adobe Stock Work management platform Asana has rolled out a new suite of features and product integrations designed to...more

Image: Blue Planet Studio/Adobe Stock There are a series of IT force multipliers CIOs should execute to create new opportunities...more