Mix of legacy OT and connected technologies creates security gaps

Most companies with OT security challenges are implementing systems for detecting and proactively derailing threats, while some are also deploying tools that use decoys and deception to throw off attackers. ISG predicts the next wave of OT security solutions will focus on big data.

Read full article on Help Net Security

 


Date:

Categorie(s):

Tag(s):