Operational technology (OT) sits at the heart of modern society. From power generation and water treatment to manufacturing plants and data centers, OT systems keep the physical world running. But securing these environments is fundamentally different from securing...
Meeting ICS cybersecurity standards, such as IEC 62443 and NIST 800-82, requires more than just documenting policies or checking boxes. Industrial control systems rely on complex, layered software stacks—much of it legacy, third-party, or built with older...
How do you protect the beating heart of modern manufacturing—smart factories—from equally smart attackers? That’s the question host Paul Ducklin explored with Joseph M. Saunders, CEO and Founder of RunSafe Security, in an episode of Exploited: The Cyber Truth. From...
Operational Technology (OT) security isn’t just a technical problem—it’s a national security imperative. In the latest episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joe Saunders joined host Paul Ducklin to answer a big question: Can we fix OT...
Operational technology (OT) ransomware attacks have escalated to crisis levels in 2025. A recent FBI report revealed a 9% increase in ransomware attacks targeting U.S. infrastructure in 2024, with more than 1,300 complaints linked to critical sectors like energy,...
Industrial systems worldwide share a common weakness in their software supply chains that most security strategies completely miss. Just ask Andy Kling, VP of Cybersecurity at Schneider Electric, one of the world’s leading industrial automation and energy companies....