IT/OT Cyber Theory: Espionage vs. Sabotage The second-generation of OT security advice started to emerge in 2012-2016. Read More » January 6, 2026
Where does IT Security END and OT Security BEGIN? The standard answer to this questions is “The Consequence Boundary”…but which kind of consequences are we talking about? And aren’t there different levels of consequence? We help define these to answer the question. Read More » December 26, 2024