Articles By Dragos

    • The importance of industrial incident response

      With data highlighting that an estimated 30,000 cyberattacks happen every day, and companies fall victim to them every 39 seconds, it is fair to say that cybercrime is a major threat to every organisation on the planet.

    • 5 critical controls for world-class OT cybersecurity

      How to align your leadership and implement a successful Operational Technology (OT) security posture. As operational technology (OT) cybersecurity becomes a top priority from boardrooms to the manufacturing floor, CISOs and their teams must implement proven strategies to protect the business.

    • The ransomware threat to industrial organisations

      In the last year, ransomware has skyrocketed to become the most dominant threat in today’s attack landscape, with 37 percent of global organisations falling victim.

    • 2021 ICS/OT cybersecurity year in review

      The industrial cyber threat landscape is constantly changing with new adversaries, vulnerabilities, and attacks that put operations and safety at risk. Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 Year in Review.

    • 200 not out

      As Connectivity reaches 200 issues, we take a quick look at where our strategic partners sit in the Industry 4.0 landscape, what factors are driving them forwards, and also what milestones they’ve achieved in getting to where they are today.

    • Securing industrial digital transformation

      Today, all businesses and organisations across the world are going through a period of rapid digital transformation. From banks offering more services online, businesses adopting hybrid working, or industrial organisations deploying automation at scale to take over manual processes, the digital evolution is upon us and our reliance on technology has never been greater.

    • Accelerate digital transformation securely with the Dragos Platform now in the Deloitte Smart Factory

      Companies need innovative and comprehensive solutions to help securely accelerate digital transformation. 

    • How to tackle OT vulnerability management

      Enterprises need to evolve operational technology (OT) vulnerability management practices as cyber adversaries pick apart weaknesses in industrial environments to orchestrate attacks. More than 91% of organisations include on-premises IT infrastructure assets in vulnerability programs but only 23% do the same for OT assets.

    • A risk assessment for ransomware prevention in OT environments

      Ransomware attacks, targeting IT networks, disrupt everyday life when the safety and availability of operational technologies are at risk. Despite the valiant efforts of cyber professionals, security best practices and better “cyber hygiene” are ineffective against the blended approaches adversaries employ.


Company Profile

Article archive for ;

This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.