Adoption of Secure Cloud Services in Critical Infrastructure
CyberSecurity Insiders
OCTOBER 28, 2022
In an example from last year, lack of risk-based adoption of cloud software and lack of controls to prevent access to ICS networks caused service disruption at a US drinking water treatment facility, where cyber-attack via poorly controlled cloud software (desktop sharing) had increased sodium hydroxide levels in drinking water [v].
Let's personalize your content