Utility Dive: Historically, attackers had to be on-premise, inside a facility to wreak the physical operational disruption malware like Triton was designed to create. But cyberattacks are maturing, circumventing information technology to target operational technology.
But there's a misunderstanding between IT and OT practices.
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now