Category: Sections

TPCRM for OT: managing cyber risks across the supply chain

In a highly interconnected industrial environment, operational performance relies on an extended ecosystem of partners: critical suppliers, system integrators, maintenance providers, software vendors, IT and OT service providers, and others. While this ecosystem is essential to the company’s operations, it also represents one…

Purple Teaming for OT:  How to switch from a compliance to a performance mindset?

In our previous articles of this OT cybersecurity monitoring series (Cybersecurity monitoring for OT / Cybersecurity tooling strategy), we explained the current state of OT detection capabilities and discussed the right tooling strategy.  This third article focuses on a key question: how do you measure the efficiency of…

Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem 

 A deepfake is a form of synthetic content that emerged in 2017, leveraging artificial intelligence to create or manipulate text, images, videos, and audio with high realism. Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now…

Protecting Connected Instruments: A Growing Challenge for Laboratories

Laboratory Equipment: An Overlooked Cybersecurity Risk Industries such as pharmaceuticals, chemicals or agri-food heavily rely on laboratory equipment, especially for quality control, R&D or chemical analysis. These instruments are vital for numerous business processes, many of which are critical for…

Artificial intelligence has become a staple of cybersecurity marketing featured in product claims, pitch decks, and dashboards alike. “Autonomous scanning”, “AI-driven risk scoring”, “Remediation Execution”: claims like these are now standard in cybersecurity marketing. But when you peel back the…

Back to top