Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Cell C may list on the JSE as Blue Label eyes big restructuring

      16 May 2025

      Nvidia shares roar back to life

      16 May 2025

      5 000 fake DStv chargers seized, destroyed in Durban port bust

      16 May 2025

      Now Facebook wants to … scan your face

      16 May 2025

      Grok’s South Africa blunder raises alarms over chatbot oversight

      16 May 2025
    • World

      Microsoft to lay off 3% of workforce in organisation-wide cuts

      14 May 2025

      AI-voiced audiobooks are coming to Audible

      13 May 2025

      Apple turns to AI to tackle iPhone battery woes

      13 May 2025

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025
    • In-depth

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025
    • TCS

      Meet the CIO | Schalk Visser on Cell C’s big tech pivot

      13 May 2025

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Security risks underestimated by operational technology organisations

    Security risks underestimated by operational technology organisations

    By Skybox Security17 November 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    A new research study has revealed that operational technology (OT) organisations have a lot to be concerned about.Fifty-five percent of all respondents are highly confident that their organisation will not experience an OT security breach in the next year, yet 83% said they had at least one OT security breach in the past 36 months.

    Find out why OT systems and devices are ripe for attackers, and why the OT environment is extremely difficult to secure.

    This research paper explores the following topics:

    • CISO disconnect between perception and reality; utilities overconfidence foreshadows future breaches
    • Reliance on cyber liability insurance as a security “strategy”
    • Maintaining compliance is a top security concern
    • Third-party access to the network and IoT and IIoT devices are top security risks
    • Maintaining uptime and availability and multivendor technologies are a top challenge
    • Network misconfigurations, adherence to security controls and network segmentation are problematic
    • Functional silos lead to fragmented security approaches

    Learn the five steps to shore up OT security, including:

    • Strengthen your security posture management
    • Implement automation to ensure continuous compliance
    • Find exposed vulnerabilities with a network model
    • Eliminate silos for unified security efforts
    • Remediate with options that go beyond patching

    Download the report here.

    About Skybox Security
    Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our Security Posture Management Platform delivers complete visibility, analytics and automation to quickly map, prioritise and remediate vulnerabilities across your organisation. The vendor-agnostic solution intelligently optimises security policies, actions and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected. We are Skybox.

    Visit www.skyboxsecurity.com for more information or have a look at all of the recent Skybox Security content on hub.techcentral.co.za/skybox.

    • This promoted content was paid for by the party concerned


    Skybox Skybox Security
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCounting on the cloud in trying times
    Next Article A guide to boosting your website traffic for Black Friday

    Related Posts

    4 tips for exposure management of your business applications

    19 February 2025

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Add A Comment

    Comments are closed.

    Company News

    Zoom Fibre’s mission: powering the economy with world-class internet

    16 May 2025

    Retailers: take back control of your tech stack with self-enablement

    15 May 2025

    Sigfox South Africa unveils next-gen asset intelligence for smarter logistics

    15 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.