Preparing for IT/OT convergence: Best practices
CyberSecurity Insiders
SEPTEMBER 21, 2021
initiative , such as industrial IoT, the amount of IT-related equipment can balloon to 40 percent of the OT infrastructure. These often use proprietary network protocols and lack basic security controls like authentication or encryption. They include: • Threat Detection that combines behavioral anomalies with policy-based rules.
Let's personalize your content