<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Operational Technology Archives - The Integrator</title>
	<atom:link href="https://integratormedia.com/tag/operational-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://integratormedia.com/tag/operational-technology/</link>
	<description>EMEA&#8217;s Most Sought-After Publication by SMEs and Global Corporates</description>
	<lastBuildDate>Mon, 11 Dec 2023 14:52:12 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Emerson and Nozomi Establish Agreement to Secure Critical Industrial Processes</title>
		<link>https://integratormedia.com/2022/07/29/emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes</link>
					<comments>https://integratormedia.com/2022/07/29/emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 29 Jul 2022 07:33:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Emerson]]></category>
		<category><![CDATA[industrial control system]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Nozomi]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[real-time operational visibility]]></category>
		<category><![CDATA[Software and technology provider]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=12910</guid>

					<description><![CDATA[<p>Software and technology provider Emerson and Nozomi Networks, a provider of operational technology (OT) have announced that they have established an agreement to meet the growing demand for OT cybersecurity services and solutions in the specific industries both companies serve. Emerson will offer Nozomi Networks’ advanced solutions for industrial control system cyber resiliency and real-time [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2022/07/29/emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes/">Emerson and Nozomi Establish Agreement to Secure Critical Industrial Processes</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Software and technology provider Emerson and Nozomi Networks, a provider of operational technology (OT) have announced that they have established an agreement to meet the growing demand for OT cybersecurity services and solutions in the specific industries both companies serve.</p>
<p>Emerson will offer Nozomi Networks’ advanced solutions for industrial control system cyber resiliency and real-time operational visibility to customers worldwide. The agreement combines Nozomi Networks’ industry-leading OT &amp; IoT security and visibility capabilities with Emerson’s DeltaV distributed control system (DCS), consulting, and professional services.</p>
<p>“By teaming with Nozomi Networks, Emerson is enhancing our customers&#8217; immediate access to OT network visibility, security, and asset intelligence that integrates seamlessly with our DeltaV DCS and is fully supported by the Emerson Cybersecurity Services organization,” said Alexandre Peixoto, Cybersecurity Business Director of Emerson’s Process Systems and Software business.</p>
<p>“We are teaming with Emerson to address the growing cybersecurity concerns that are an everyday reality for modern automation processes,” said Nozomi Networks CEO Edgard Capdevielle.</p>
<p>Nozomi Networks’ full suite of OT and IoT cybersecurity solutions is now available globally through Emerson.</p>
<p>The post <a href="https://integratormedia.com/2022/07/29/emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes/">Emerson and Nozomi Establish Agreement to Secure Critical Industrial Processes</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2022/07/29/emerson-and-nozomi-establish-agreement-to-secure-critical-industrial-processes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are You Prepared for More OT Threats?</title>
		<link>https://integratormedia.com/2022/01/20/are-you-prepared-for-more-ot-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-prepared-for-more-ot-threats</link>
					<comments>https://integratormedia.com/2022/01/20/are-you-prepared-for-more-ot-threats/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 20 Jan 2022 12:42:08 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Tech Features]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Cyber events]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Report]]></category>
		<category><![CDATA[Digital Attack]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[OT System]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=11841</guid>

					<description><![CDATA[<p>By Rick Peters, Fortinet For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. The reality is most citizens don&#8217;t think about these systems until there is a problem. That is why the attack against Colonial Pipeline in May 2021 was so startling. The attack on a segment of [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2022/01/20/are-you-prepared-for-more-ot-threats/">Are You Prepared for More OT Threats?</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote><p>By Rick Peters, Fortinet</p></blockquote>
<p>For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. The reality is most citizens don&#8217;t think about these systems until there is a problem. That is why the attack against Colonial Pipeline in May 2021 was so startling. The attack on a segment of the enterprise transcended IT and resulted in a temporary but severe disruption of the OT based fuel supplies and led the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to issue an advisory urging critical infrastructure (CI) asset owners and operators to take on a heightened state of awareness.</p>
<div id="attachment_11842" style="width: 185px" class="wp-caption alignleft"><a href="https://varonline.com/wp-content/uploads/2022/01/By-Rick-Peters-CISO-Operational-Technology-Fortinet.jpg"><img decoding="async" aria-describedby="caption-attachment-11842" class=" wp-image-11842" src="https://varonline.com/wp-content/uploads/2022/01/By-Rick-Peters-CISO-Operational-Technology-Fortinet-300x300.jpg" alt="" width="175" height="175" /></a><p id="caption-attachment-11842" class="wp-caption-text"><em>Rick Peters, CISO Operational Technology, Fortinet</em></p></div>
<p><span style="font-size: 14px;">Unfortunately, the attack against Colonial Pipeline isn’t the first or last time an adversarial cyberattack on an OT target will make headlines. Malicious cyberattacks are likely to increase given the opportunities for mission impact, social anxiety, and profit that disrupting systems and stealing intellectual property from OT and IT systems represent.</span></p>
<p>OT cyber events also have demonstrated the consequence of failing to invest and commit proportionally to a cybersecurity strategy. For years OT system owners relied on the &#8220;air gap&#8221; that separated OT systems from IT to protect them. But as more and more OT organizations digitally connect OT infrastructures such as supervisory control and data acquisition (SCADA) systems with IT networks, the resulting evaporation of the air gap has dramatically increased the level of risk. Given this situation, it is not a surprise that in the “2021 State of Operational Technology and Cybersecurity Report” 9 out of 10 OT organizations experienced at least one intrusion in the past year and 63% had three or more intrusions.</p>
<p>To protect cyber-physical assets, OT organizations need to commit to a proactive cybersecurity strategy, paying particular attention to visibility, control, and behavior analysis. It&#8217;s critical to protect every point of connection to the outside world to proactively safeguard OT.</p>
<h2><strong>OT Is No Longer a Niche Exploit</strong></h2>
<p>In the past, exploits against SCADA or industrial control systems (ICS) were viewed as an infrequent subset of highly structured and often nation-state-sponsored targeted attacks. But the OT market is expected to continue to grow through 2027 at a CAGR of 6.40%. Relying on obscurity as a defense strategy doesn&#8217;t work anymore; it&#8217;s practically an invitation to cybercriminals to penetrate and ultimately compromise OT systems. Although IT-related exploits are still more prevalent, according to the Global Threat Landscape Report from FortiGuard Labs, a growing number of exploits are targeting OT. The long-held perception that ICS exploits are an obscure niche of the cyber threat landscape is simply no longer the case.</p>
<h2><strong>Why Now?</strong></h2>
<p>In the past, OT attacks were the domain of specialized threat actors who knew how to exploit ICS and SCADA systems. But now, many of those tools are being packaged as attack kits on the dark web, so they are available to a much broader set of less technical attackers. The motivations behind the attacks are ranging from gaining a profit through extortion, stealing intellectual property to simply testing infrastructure resilience. The attacks offer a side benefit in that they create a climate of uncertainty and can force actions by executives in the government and commercial sector. The headlines generated from a successful attack on OT infrastructure only serve to amplify these effects.</p>
<h2><strong>The Need for Better Visibility</strong></h2>
<p>The rapid expansion in the threat landscape and the increase in attacks demonstrate the increased need for integration between enterprise solutions and operational infrastructure. In most cases, security considerations need to extend to on-premise systems and extend to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices. It&#8217;s also important to have an infrastructure control strategy that restricts and contains suspicious activity and behavior. At a minimum, organizations should implement zero-trust network access (ZTNA), which limits user or device access to only those resources required to perform a specific role or function. ZTNA also strictly limits the range and level of engagement, which serves to restrict an activity if a system is compromised.</p>
<p>OT organizations that put comprehensive security policies in place give themselves an advantage over threat actors and can limit the impact of a breach. OT infrastructure is no longer benefiting from obscurity and the adoption of near-universal convergence of IT and OT networks implies traditionally isolated environments are no longer safe. Organizations must take proactive steps to harden OT environments, including integrating tools and practices designed to protect, detect, and respond to threats in real-time. Although attacks are inevitable, they don&#8217;t have to be successful.</p>
<p>The post <a href="https://integratormedia.com/2022/01/20/are-you-prepared-for-more-ot-threats/">Are You Prepared for More OT Threats?</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2022/01/20/are-you-prepared-for-more-ot-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dragos Continues Expansion to Meet Demands for Industrial Cybersecurity</title>
		<link>https://integratormedia.com/2021/12/27/dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity</link>
					<comments>https://integratormedia.com/2021/12/27/dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 27 Dec 2021 13:28:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dragos]]></category>
		<category><![CDATA[ICS Cyber Security]]></category>
		<category><![CDATA[Industrial Control Systems]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=11713</guid>

					<description><![CDATA[<p>Dragos, a provider in cybersecurity for industrial control systems (ICS)/operational technology (OT) environments, has announced further expansion in the Kingdom of Saudi Arabia (KSA), where Dragos has its regional headquarters at the Saudi Information Technology Company (SITE) in Riyadh, in alignment with accelerated growth in the country. An official statement quoted, “The expansion supports priorities set [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2021/12/27/dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity/">Dragos Continues Expansion to Meet Demands for Industrial Cybersecurity</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dragos, a provider in cybersecurity for industrial control systems (ICS)/operational technology (OT) environments, has announced further expansion in the Kingdom of Saudi Arabia (KSA), where Dragos has its regional headquarters at the Saudi Information Technology Company (SITE) in Riyadh, in alignment with accelerated growth in the country.</p>
<p>An official statement quoted, “The expansion supports priorities set by Saudi Arabia’s 2020 budget allocation of SAR102 billion ($27.2 billion) for security and regional administration including cybersecurity, as well as the Kingdom of Saudi Arabia Vision 2030 pillar on National Industrial Development and Logistics. “</p>
<p>Bruce Niven, Chief Investment Officer, Aramco Ventures said, “Dragos is that partner and as a testament to our trust in them, we have invested in the company. We are pleased that Dragos continues to expand its footprint to enable more organizations in the region to secure the critical infrastructure that serves our communities and contributes to the global economy.”</p>
<p>Dragos is privately held and headquartered in the Baltimore-Washington, DC area with a regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.</p>
<p>The post <a href="https://integratormedia.com/2021/12/27/dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity/">Dragos Continues Expansion to Meet Demands for Industrial Cybersecurity</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2021/12/27/dragos-continues-expansion-to-meet-demands-for-industrial-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
