Loading...
Blog2021-01-31T17:40:27+01:00
  • The dangerous average

The Dangerous Average

Tags: , , , |

Sooner or later in every strategy project, the question regarding one single KPI, one single number that sums up an organization's entire security posture comes into the discussion. This can become dangerous for your cyber organization.

Cyber Security: Lead by Context, not by Control in Cyber

Tags: , , |

Today, with increasing digitalization and related growing attack surface, these physical measures are no longer sufficient to protect environments. OT networks and components are increasingly connected to enterprise-wide services. At BxC, we believe that IAM in connected factories and legacy OT is a cornerstones of adequate protection against digital attacks.

  • OT Security Strategy

OT Security Strategy

Tags: , , |

Cybersecurity within manufacturing is often perceived as complicated, expensive, and challenging with its manifold number of cross dependencies. With clients, we often encounter similar questions and show how we design, communicate, and implement a manufacturing cybersecurity program that provides real security benefits while avoiding program fatigue.

  • IAM in connected OT

IAM in connected OT

Tags: , , , |

Today, with increasing digitalization and related growing attack surface, these physical measures are no longer sufficient to protect environments. OT networks and components are increasingly connected to enterprise-wide services. At BxC, we believe that IAM in connected factories and legacy OT is a cornerstones of adequate protection against digital attacks.

  • OT Security Assessment

OT Security Assessments

Tags: , |

With increasing digitalization and constantly growing threat landscapes, manufacturing environments are more at risk than ever before. We want to share our lessons learned along these journeys by highlighting, what you should keep in mind when heading out to assess your manufacturing sites.

  • Shifting the Cyber Focus

Shifting the Cyber Focus

Tags: , |

Today, modern cybersecurity tools are among the most frequently discussed topics in the IT and OT security world. They form the foundation of nearly all security domains and are seen by business leaders and the C-Suite as the holy, but expensive, grail to a protected company. In this article, we are evaluating current shortcomings in the IT and OT security domains.

Go to Top