Related Articles

  • The dangerous average

The Dangerous Average

Tags: , , , |

Sooner or later in every strategy project, the question regarding one single KPI, one single number that sums up an organization's entire security posture comes into the discussion. This can become dangerous for your cyber organization.

Cyber Security: Lead by Context, not by Control in Cyber

Tags: , , |

Today, with increasing digitalization and related growing attack surface, these physical measures are no longer sufficient to protect environments. OT networks and components are increasingly connected to enterprise-wide services. At BxC, we believe that IAM in connected factories and legacy OT is a cornerstones of adequate protection against digital attacks.

  • OT Security Strategy

OT Security Strategy

Tags: , , |

Cybersecurity within manufacturing is often perceived as complicated, expensive, and challenging with its manifold number of cross dependencies. With clients, we often encounter similar questions and show how we design, communicate, and implement a manufacturing cybersecurity program that provides real security benefits while avoiding program fatigue.

  • IAM in connected OT

IAM in connected OT

Tags: , , , |

Today, with increasing digitalization and related growing attack surface, these physical measures are no longer sufficient to protect environments. OT networks and components are increasingly connected to enterprise-wide services. At BxC, we believe that IAM in connected factories and legacy OT is a cornerstones of adequate protection against digital attacks.

  • OT Security Assessment

OT Security Assessments

Tags: , |

With increasing digitalization and constantly growing threat landscapes, manufacturing environments are more at risk than ever before. We want to share our lessons learned along these journeys by highlighting, what you should keep in mind when heading out to assess your manufacturing sites.

Go to Top