New Secure by Demand guidance available for operational technology owners and operators
Threat actors are successfully targeting particular operational technology (OT) products, rather than specific organisations, when compromising OT components. Many OT products are not designed and developed with Secure-by-Design principles and…