Operational Technologies (OT) stories
Customers can now spot hidden operational technology and IoT devices without extra hardware, helping close risky blind spots across mixed networks.
Customers can now spot hidden factory-floor and building systems in Tenable's platform without extra hardware, agents or software.
The recognition broadens Rockwell Automation’s software push as manufacturers seek AI tools that tie plant data to finance and planning systems.
Most companies still lack confidence in their response as 73% of senior cyber security decision-makers say they are not ready for a major attack.
The update gives security teams prioritised fixes for missing asset data as attacks on operational technology continue to expose gaps in defences.
IT teams could cut routine handling time as N-able connects live endpoint data to external AI models and embeds guidance in its consoles.
Growing fears over harvest-now, decrypt-later attacks are driving demand for quantum-safe controls as data moves to edge systems and cloud services.
Enterprises can now assess suspicious files in under 100 milliseconds, as OPSWAT adds a machine-learning layer to MetaDefender.
Buyers of industrial control systems may gain confidence as Yokogawa’s plant software clears three independent cybersecurity certifications.
Proxy networks built from compromised home devices are helping attackers hide in plain sight across Asia Pacific, Lumen says.
Credential theft and trusted tools are helping intruders bypass traditional defences, with manufacturing firms among the hardest hit.
Weak identity controls are now driving most attacks on Australian organisations, with breaches hitting revenue, customers and supply chains.
Rising AI traffic is pushing firms to treat wireless upgrades as a growth bet, with most planning bigger budgets and faster refreshes.
Modern regulators now sit below software defences, raising the risk of attacks that could disrupt services, corrupt data or damage hardware.
Pressure is mounting on industrial firms to prove returns from AI, as Radix prepares a Houston forum aimed at scaling projects beyond pilots.
Australian security teams are under pressure to prioritise fixes as attacks surge and exploited vulnerabilities can now be used within five days.
Security teams are turning to continuous, risk-based assessment as fragmented tools leave them unable to see which exposures matter most.
Critical infrastructure and cloud operators face harder-to-detect attacks as criminals turn routers, VPN gateways and IoT kit into proxies.
Critical infrastructure operators could face remote building systems attacks after Claroty found flaws in a standard linking legacy controls to IP networks.
Road agencies face rising threats as a Detroit expo adds a new Cybersecurity & Data Zone for connected transport systems.