CINXE.COM
The OT Cybersecurity Blog
<!DOCTYPE html><!-- Last Published: Tue Nov 26 2024 20:48:33 GMT+0000 (Coordinated Universal Time) --><html data-wf-domain="www.nozominetworks.com" data-wf-page="6545247d392723f0e478ff9a" data-wf-site="645a4534705010e2cb244f50" lang="en"><head><meta charset="utf-8"/><title>The OT Cybersecurity Blog</title><meta content="Learn about the latest industry trends, new product features, partnerships, emerging threats, security research and more from Nozomi Networks." name="description"/><meta content="The OT Cybersecurity Blog" property="og:title"/><meta content="Learn about the latest industry trends, new product features, partnerships, emerging threats, security research and more from Nozomi Networks." property="og:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65049c6616d0c78a15cf00d1_NN-Blog-Page-Thumbnails-1200x628px.webp" property="og:image"/><meta content="The OT Cybersecurity Blog" property="twitter:title"/><meta content="Learn about the latest industry trends, new product features, partnerships, emerging threats, security research and more from Nozomi Networks." property="twitter:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65049c6616d0c78a15cf00d1_NN-Blog-Page-Thumbnails-1200x628px.webp" property="twitter:image"/><meta property="og:type" content="website"/><meta content="summary_large_image" name="twitter:card"/><meta content="width=device-width, initial-scale=1" name="viewport"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/css/nozomi-2023.5a461d78a.min.css" rel="stylesheet" type="text/css"/><link href="https://fonts.googleapis.com" rel="preconnect"/><link href="https://fonts.gstatic.com" rel="preconnect" crossorigin="anonymous"/><script src="https://ajax.googleapis.com/ajax/libs/webfont/1.6.26/webfont.js" type="text/javascript"></script><script type="text/javascript">WebFont.load({ google: { families: ["Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic","Vollkorn:400,400italic,700,700italic","Merriweather:300,300italic,400,400italic,700,700italic,900,900italic","Open Sans:300,300italic,400,400italic,600,600italic,700,700italic,800,800italic","Oswald:200,300,400,500,600,700"] }});</script><script type="text/javascript">!function(o,c){var n=c.documentElement,t=" w-mod-";n.className+=t+"js",("ontouchstart"in o||o.DocumentTouch&&c instanceof DocumentTouch)&&(n.className+=t+"touch")}(window,document);</script><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca135c2a0377136b5d42b_NN-Favicon-32x32px.png" rel="shortcut icon" type="image/x-icon"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca12dbfa711f6599f64a5_NN-Favicon-256x256px-white.png" rel="apple-touch-icon"/><link href="https://www.nozominetworks.com/blog" rel="canonical"/><script async="" src="https://www.googletagmanager.com/gtag/js?id=G-XPDLLMSMHQ"></script><script type="text/javascript">window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments);}gtag('js', new Date());gtag('set', 'developer_id.dZGVlNj', true);gtag('config', 'G-XPDLLMSMHQ');</script><script id="jetboost-script" type="text/javascript"> window.JETBOOST_SITE_ID = "clj7g82ou015p0qp589h903v7"; (function(d) { var s = d.createElement("script"); s.src = "https://cdn.jetboost.io/jetboost.js"; s.async = 1; d.getElementsByTagName("head")[0].appendChild(s); })(document); </script> <style> .image-div-fit { object-fit: cover; object-position: bottom left; } .image-div-fit-related { object-fit: cover; object-position: bottom left; } .image-div-fit-blog { object-position: center!important; } .code-snippet { padding: 40px; background-color: #efefef; width: 100%; overflow-wrap: anywhere; font-family: Courier New; } .footer-subscribe-embed-box .hs-form-private { display: block!important; } .footer-subscribe-embed-box label { margin-bottom: 5px; color: #fff; font-family: Montserrat; font-weight: 400; } .footer-subscribe-embed-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 14px; border: 0px; width: 95%; min-width: 275px; margin-right: 10px; } .footer-subscribe-embed-box .hs-fieldtype-checkbox { margin-top: 15px; } .footer-subscribe-embed-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; } .footer-subscribe-embed-box .inputs-list { padding-left: 0px; list-style-type: none; } .sidebar-newsletter-box .hs-fieldtype-checkbox { margin-top: 15px; } .sidebar-newsletter-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .inputs-list { padding-left: 0px; list-style-type: none; } .footer-subscribe-embed-box .is-placeholder { padding-bottom: 8px!important; } .footer-subscribe-embed-box .hs-input option { padding-bottom: 0px!important; } .sidebar-newsletter-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 11px; border: 0px; width: 95%; margin-right: 10px; } .sidebar-newsletter-box .hs-error-msg { font-size: 12px; font-weight: 800; font-family: Montserrat; color: #D13164; } .sidebar-newsletter-box .hs-error-msgs { padding-left: 0px; list-style-type: none } .sidebar-newsletter-box label { font-family: Montserrat; color: #fff; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .sidebar-newsletter-box .hs-form-private { justify-content: left!important; } .footer-subscribe-embed-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .footer-subscribe-embed-box .hs-error-msgs{ padding-left: 15px; color: #D13164; font-family: Montserrat; font-size: 10px; display: block!important; } .footer-subscribe-embed-box .hs-fieldtype-select { margin-right: -12px; } .footer-subscribe-embed-box .submitted-message { max-width: 350px; margin-left: auto; margin-right: auto; font-size: 14px; font-family: Montserrat; text-align: center; color: #fff; font-weight: 700; } .legal-content-section { justify-content: flex-start; display: flex; line-height: 26px; font-family: 'Montserrat'; font-size: 18px; font-weight: 400; } .legal-content-section h5 { margin-top: 10px; font-size: 18px; line-height: 26px; } .legal-content-section li { font-weight: 400; line-height: 24px; margin-bottom: 8px; } @supports (display: flex) { @media screen and (max-width: 480px) { .footer-subscribe-embed-box .hs-form-private { display: block!important; } } } </style> <script> var hsscript = document.createElement("script"); hsscript.src = "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js"; hsscript.async = 1; hsscript.dataset.apikey = "5105728fe4c8805a36893632a83b6e"; hsscript.dataset.cookieless = 1; hsscript.dataset.autoIdentify = 1; document.getElementsByTagName('head')[0].append(hsscript); </script> <script> document.addEventListener("DOMContentLoaded", function() { var authorElement = document.querySelector('.post-author-text-byline-author'); if (authorElement) { var authorName = authorElement.textContent.trim(); window.dataLayer = window.dataLayer || []; window.dataLayer.push({ 'event': 'authorDataReady', 'author': authorName }); } else { console.error("Author element not found"); } }); </script> <!-- OneTrust Cookies Consent Notice start for nozominetworks.com --> <script src=https://cdn.cookielaw.org/scripttemplates/otSDKStub.js type="text/javascript" charset="UTF-8" data-domain-script="1b3a08d1-270d-4dc7-8bd4-239c4aab3143" ></script> <script type="text/javascript"> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for nozominetworks.com --> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-NMJG569" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <script> window.dataLayer = window.dataLayer || []; </script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!=='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NMJG569');</script> <!-- End Google Tag Manager --> <!-- Start of HubSpot Embed Code --> <script type="text/javascript" id="hs-script-loader" async defer src="https://js.hs-scripts.com/2724979.js"></script> <!-- End of HubSpot Embed Code --> <!-- Start of Navattic Embed Code --> <script>void 0===window.navatticQueue&&(window.navatticQueue=[],window.navattic=new Proxy({},{get:function n(t,u,e){return function(){for(var n=arguments.length,t=Array(n),e=0;e<n;e++)t[e]=arguments[e];return navatticQueue.push({function:u,arguments:t})}}}));</script> <script async src=https://js.navattic.com/sdk.js data-key="pkey_cm34kqm5r01wars3b4wc40m5f"></script> <!-- End of Navattic Embed Code --><style> .image-div-fit { object-fit: cover; object-position: bottom left; } </style><script type="text/javascript">window.__WEBFLOW_CURRENCY_SETTINGS = {"currencyCode":"USD","symbol":"$","decimal":".","fractionDigits":2,"group":",","template":"{{wf {\"path\":\"symbol\",\"type\":\"PlainText\"} }} {{wf {\"path\":\"amount\",\"type\":\"CommercePrice\"} }} {{wf {\"path\":\"currencyCode\",\"type\":\"PlainText\"} }}","hideDecimalForWholeNumbers":false};</script></head><body><div class="navigation-full"><section class="announcement-bar"><div class="w-layout-blockcontainer announcement-bar-container w-container"><div class="announcement-bar-text"><strong>Live Demo: The Nozomi Networks Platform in 15 Minutes<br/></strong></div><a href="https://www.nozominetworks.com/resources/live-demo-the-nozomi-networks-platform-in-15-minutes" target="_blank" class="announcement-bar-button w-button">Register Now</a></div></section><div class="navigation-top-banner"><div class="container-navigation top-menu-container w-container"><div class="navigation-link-wrapper top-navigation-link-wrapper"><a href="/academy" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Academy</div></a><a href="/labs" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Labs</div></a><a href="/company/careers" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Careers</div></a><a href="https://partners.nozominetworks.com/English/" target="_blank" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Partner Login</div></a><a href="/support" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Support</div></a><div class="search-bar-container"><form action="/search" class="search w-form"><input class="search-input new-search w-input" maxlength="256" name="query" placeholder="Search our site" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></div></div></div><div data-collapse="medium" data-animation="default" data-duration="400" data-easing="ease" data-easing2="ease" role="banner" class="navigation w-nav"><div class="container-navigation"><div class="navigation-link-wrapper"><a href="/" class="brand w-nav-brand"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647cdfc8e9b140d6c4dd4877_nozomi-logo.svg" loading="eager" width="Auto" height="Auto" alt="Nozomi logo" class="logo-image"/></a></div><div class="navigation-button-wrapper"><nav role="navigation" class="menu-wrap w-nav-menu"><div data-hover="false" data-delay="0" data-w-id="1ab40eba-a5f5-f7de-7704-089030f70ece" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Platform</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid"><div id="w-node-_3ea21f8a-1846-69ab-921e-8e8150a3c30a-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dee6d3014cdc037112e34_nozomi-platform-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Platform Overview</h3><p class="nozomi-mega-menu-white-box-paragraph">Our industrial cybersecurity solutions deliver unmatched asset intelligence, threat detection and AI-driven insights.</p><a href="/products" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_400aa6f7-63fa-cc3f-8563-dc071d4fcba7-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">MANAGERS</div><a href="/products/vantage" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Vantage</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Cloud</div></div></a><a href="/products/central-management-console" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Central Management Console</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">On prem</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">SENSORS</div><a href="/products/guardian" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Network</div></div></a><a href="/products/guardian-air" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian Air</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Wireless</div></div></a><a href="/products/arc" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Arc</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Endpoint</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">ENHANCEMENTS</div><a href="/products/vantage-iq" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Vantage IQ</div></a><a href="/products/asset-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Intelligence</div></a><a href="/products/threat-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Intelligence</div></a><a href="/products/smart-polling" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Polling</div></a></div></div><div id="w-node-d93d606f-7616-665b-d9d6-f2be7c09df30-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df4835368816567937004_nozomi-platform-menu-icon-2.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Professional Services</h3><p class="nozomi-mega-menu-white-box-paragraph">OT and IoT security expertise that speeds solution deployment and maximizes value</p><a href="/professional-services" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-c4efda6a-2861-356b-d552-253f04d97b7b-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">PROFESSIONAL <br/>SERVICES</div><a href="/professional-services/solution-design" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Design</div></a><a href="/professional-services/solution-deployment" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Deployment</div></a><a href="/professional-services/fast-track-service-packages" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Fast Track</div></a><a href="/professional-services/solution-optimization" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Optimization</div></a><a href="/professional-services/project-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Project Management</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="e1a612db-5ef3-2e1e-ef70-834ad7caa020" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Solutions</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-solutions"><div id="w-node-e1a612db-5ef3-2e1e-ef70-834ad7caa030-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf62bc558e18211b85_nozomi-solutions-menu-icon-1.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">BUSINESS NEED</div></div><a href="/solutions/iot-ot-asset-inventory-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Inventory Management</div></a><a href="/solutions/threat-detection-and-response" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Detection & Response</div></a><a href="/solutions/iot-ot-network-monitoring" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Continuous Network Monitoring</div></a><a href="/solutions/iot-ot-vulnerability-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Risk & Vulnerability Management</div></a><a href="/solutions/iot-security" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">IoT Security</div></a><a href="/solutions/data-center-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Center Cybersecurity</div></a><a href="/solutions/building-automation-system-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Building Automation System<br/>Cybersecurity</div></a></div></div><div id="w-node-f086dac4-d3e5-963f-9b8e-0ff111f5ae9d-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper industry-nav-link-list-small-header"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf74ced86d0dc1c29c_nozomi-solutions-menu-icon-3.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">INDUSTRY</div></div><div class="nav-link-list-two-column-wrapper w-row"><div class="w-col w-col-6 w-col-stack"><a href="/industries/airport-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Airports</div></a><a href="/industries/electric-utilities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Electric Utilities</div></a><a href="/industries/federal-government" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Federal Government</div></a><a href="/industries/healthcare-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Healthcare</div></a><a href="/industries/manufacturing-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Manufacturing</div></a><a href="/industries/maritime-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Maritime</div></a><a href="/industries/mining-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Mining</div></a></div><div class="column-3 w-col w-col-6 w-col-stack"><a href="/industries/oil-gas-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Oil & Gas</div></a><a href="/industries/pharmaceutical-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Pharmaceutical</div></a><a href="/industries/rail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Rail</div></a><a href="/industries/retail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Retail</div></a><a href="/industries/smart-cities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Cities</div></a><a href="/industries/stadiums-arenas" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Stadiums & Arenas</div></a><a href="/industries/water-wastewater-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Water &<br/>Wastewater</div></a></div></div></div></div><div id="w-node-_6cc7f1ae-788f-64bd-f869-1683ba23c206-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bfb032786965be445e_nozomi-solutions-menu-icon-2.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">COMPLIANCE</div></div><a href="/compliance/isa-iec-62443-standards" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">ISA/IEC 62443 Standards</div></a><a href="/compliance/nerc-cip" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NERC CIP</div></a><a href="/compliance/nis2-directive-compliance" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NIS2 Directive</div></a><a href="/compliance/sec-cybersecurity-rules" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">SEC Cybersecurity Rules</div></a><a href="/compliance/tsa-security-directives" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">TSA Security Directives</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="9a7c8e13-35ed-5514-55fe-acbc3f5fa706" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Partners</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-partners"><div id="w-node-_73cd8bf4-a1be-55e6-0b6d-dc5f9a824c35-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfde6427cc3addfcd2765_nozomi-partners-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Why Partner with Us</h3><p class="nozomi-mega-menu-white-box-paragraph">Our global partner network deploys OT & IoT cybersecurity solutions for customers around the world.</p><a href="/partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_9a7c8e13-35ed-5514-55fe-acbc3f5fa70c-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt="" class="partner-menu-icon-1"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Our Partners</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore all Nozomi Networks partners</p><a href="/partners#our-partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_22c9ad28-eba7-dea8-6747-bc706e91b27b-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65df8146636482acba9ef204_partner-search-icon.svg" loading="lazy" alt="" class="partner-mega-menu-icon-med"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Find a Partner</h3><p class="nozomi-mega-menu-white-box-paragraph">Find a certified Nozomi Networks partner in your country.</p><a href="/partners/find-a-partner" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-b6981566-e6b8-35f7-7a13-38fef51a2191-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64d507342134d4fe7e42c63f_NN-Icons-3-Colors-400x400px_laptop-140.svg" loading="lazy" alt="" class="partner-portal-icon partner-portal-icon-lg"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Partner Portal</h3><p class="nozomi-mega-menu-white-box-paragraph">Log into the Nozomi Networks partner portal.</p><a href="https://partners.nozominetworks.com/English/" target="_blank" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Log In</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="7d3ce5f9-6240-b523-6112-039ee7d7c514" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Resources</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-resources-grid"><div id="w-node-c0f1f060-a76b-da20-975b-6301dc235111-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e083e33848493787fd49d_nozomi-resources-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Resource Library</h3><p class="nozomi-mega-menu-white-box-paragraph">Browse OT & IoT security research, guides, videos and more from the Nozomi Networks team.</p><a href="/resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Resources</div></a></div></div><div id="w-node-b95a8b1c-9b8b-0bf5-6bcc-881812dba420-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-resources-columns-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">RESOURCES</div><div class="nav-link-list-two-column-wrapper w-row"><div class="nav-menu-resources-column-1 w-col w-col-6"><a href="/case-studies" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Case Studies</div></a><a href="/content-packs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Content Packs</div></a><a href="/data-sheets" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Sheets</div></a><a href="/guides" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Guides </div></a><a href="/podcasts" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Podcasts</div></a></div><div class="column-4 w-col w-col-6"><a href="/research-reports" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Research Reports</div></a><a href="/solution-briefs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Solution Briefs</div></a><a href="/videos" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Videos</div></a><a href="/webinars" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Webinars</div></a><a href="/white-papers" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">White Papers</div></a></div></div></div></div><div id="w-node-_75fdf6f2-5fd5-5484-f185-d94876eefc91-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Customer Hub</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore our latest customer resources, including webinars, how-to videos, content packs and more.</p><a href="/customer-resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Hub</div></a></div></div></div></nav></div><a href="/blog" aria-current="page" class="top-nav-link-block w-inline-block w--current"><div class="nav-toggle">Blog</div></a><div data-hover="false" data-delay="0" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Company</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-company"><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfbe-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">About Nozomi Networks</h3><p class="nozomi-mega-menu-white-box-paragraph">We keep critical infrastructure and operational technology cyber resilient.</p><a href="/company" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfc8-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper nav-icon-links-grid-wrapper"><div class="nav-icon-links-column-wrapper w-row"><div class="w-col w-col-6"><a href="/company/leadership" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64c93675ed962a0e3b6e45d8_leadership-team-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Leadership Team</div></a><a href="/events" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df71e33d8cb8245cbe7_%20events-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Events</div></a><a href="/company/newsroom" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7bb1169138c54ebc8_newsroom-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Newsroom</div></a></div><div class="w-col w-col-6"><a href="/company/careers" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7e2340e9dfe2c628b_careers-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Careers</div></a><a href="/customer-testimonials" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7de423e6e0ba360c1_customer-testimonials.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Customer Testimonials</div></a><a href="/company/contact-us" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df87f088fba967ffc33_contact-us.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon contact-us-menu-icon"/><div class="nav-icon-links-text">Contact Us</div></a></div></div></div></div></div></nav></div><div class="search-bar-container search-bar-container-mobile-nav"><form action="/search" class="search search-bar-container-mobile-nav w-form"><input class="search-input new-search search-input-mobile-nav w-input" maxlength="256" name="query" placeholder="" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></nav><a href="/demo" class="nav-button hs-cta-trigger-button-hs-cta-trigger-button-152380361226 w-button">Request Demo</a><div class="menu-button w-nav-button"><div class="w-icon-nav-menu"></div></div></div></div></div></div><section class="resources-page-filter-section"><div class="w-layout-blockcontainer resources-page-filter-section-container w-container"><div class="blog-landing-page-header-wrapper"><h1 class="blog-landing-page-header">The OT & IoT Security Blog</h1><p class="blog-landing-page-header-paragraph">Learn about industry trends, new product features, partnerships, emerging threats, security research and more.</p></div><div><div class="w-row"><div class="w-col w-col-3"><div class="resources-page-filter-left-column-wrapper"><div data-hover="false" data-delay="0" class="resources-dropdown-area w-dropdown"><div class="resources-sidebar-button-toggle w-dropdown-toggle"><div class="resource-dropdown-filter-icon w-icon-dropdown-toggle"></div><div class="resources-filter-title resources-filter-title-button">Filter by Tag</div></div><nav class="resources-menu-dropdown-list w-dropdown-list"><div class="filter-block-wrapper w-form"><form id="email-form" name="email-form" data-name="Email Form" method="get" data-wf-page-id="6545247d392723f0e478ff9a" data-wf-element-id="21490337-d15b-80cc-4040-4845ae74bbac" data-turnstile-sitekey="0x4AAAAAAAQTptj2So4dx43e"><div class="jetboost-filter-znrj w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="government-regulatory-news" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Government & Regulatory News</div></div></div><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="labs-research" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Labs Research</div></div></div><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="market-leadership" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Market Leadership</div></div></div><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="partnerships" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Partnerships</div></div></div><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="product-enhancements" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Product Enhancements</div></div></div><div role="listitem" class="w-dyn-item"><div class="filter-block-line-item-wrapper"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="security-trends" /></div><label class="w-checkbox"><input type="checkbox" id="checkbox" name="checkbox" data-name="Checkbox" class="w-checkbox-input"/><span class="hidden-checkbox-label w-form-label" for="checkbox">Checkbox</span></label><div class="filter-block-line-item-text">Security Trends</div></div></div></div></div></form><div class="w-form-done"><div>Thank you! Your submission has been received!</div></div><div class="w-form-fail"><div>Oops! Something went wrong while submitting the form.</div></div></div></nav></div></div><div class="sidebar-search-wrapper"><div class="w-form"><form id="email-form-2" name="email-form-2" data-name="Email Form 2" method="get" data-wf-page-id="6545247d392723f0e478ff9a" data-wf-element-id="84e72623-7ea1-4c40-815d-14cdae6d31d8" data-turnstile-sitekey="0x4AAAAAAAQTptj2So4dx43e"><input class="sidebar-search jetboost-list-search-input-23yy w-input" maxlength="256" name="Search" data-name="Search" placeholder="Search Blogs" type="text" id="Search" required=""/><input type="submit" data-wait="Please wait..." class="search-button-hidden w-button" value="Submit"/></form><div class="w-form-done"><div>Thank you! Your submission has been received!</div></div><div class="w-form-fail"><div>Oops! Something went wrong while submitting the form.</div></div></div></div></div><div class="w-col w-col-9"><div class="resources-page-filter-right-column-wrapper"><div class="resource-page-item-grid-wrapper jetboost-list-wrapper-znrj jetboost-list-wrapper-23yy jetboost-list-wrapper-zx9k w-dyn-list"><div role="list" class="resource-collection-list-responsive w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="uks-new-national-asset-securing-data-centers-in-the-ai-era" /></div><div class="resource-page-item-grid-block"><a href="/blog/uks-new-national-asset-securing-data-centers-in-the-ai-era" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6746001a00315bc8d17260fc_Securing%20Data%20Centers%20in%20the%20AI%20Era-THUMBNAIL.webp" loading="lazy" alt="The UK’s New National Asset – Securing Data Centers in the AI Era" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6746001a00315bc8d17260fc_Securing%20Data%20Centers%20in%20the%20AI%20Era-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6746001a00315bc8d17260fc_Securing%20Data%20Centers%20in%20the%20AI%20Era-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6746001a00315bc8d17260fc_Securing%20Data%20Centers%20in%20the%20AI%20Era-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6746001a00315bc8d17260fc_Securing%20Data%20Centers%20in%20the%20AI%20Era-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The UK’s New National Asset – Securing Data Centers in the AI Era</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="insider-threats-in-ot-ics-call-for-endpoint-sensors-and-behavioral-analytics" /></div><div class="resource-page-item-grid-block"><a href="/blog/insider-threats-in-ot-ics-call-for-endpoint-sensors-and-behavioral-analytics" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/673f8f34846bfdf89942df39_INSIDER-THREATS-THUMBNAIL.webp" loading="lazy" alt="Insider Threats in OT/ICS Call for Endpoint Sensors and Behavioral Analytics" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/673f8f34846bfdf89942df39_INSIDER-THREATS-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/673f8f34846bfdf89942df39_INSIDER-THREATS-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/673f8f34846bfdf89942df39_INSIDER-THREATS-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/673f8f34846bfdf89942df39_INSIDER-THREATS-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Insider Threats in OT/ICS Call for Endpoint Sensors and Behavioral Analytics</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="hunting-the-mongoose-discovering-10-vulnerabilities-in-the-mongoose-web-server-library" /></div><div class="resource-page-item-grid-block"><a href="/blog/hunting-the-mongoose-discovering-10-vulnerabilities-in-the-mongoose-web-server-library" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67353231f5574ff80842a06d_LABS%20BLOG-%20Mongoose%20web%20server.webp" loading="lazy" alt="Hunting the Mongoose: Discovering 10 Vulnerabilities in the Mongoose Web Server Library" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67353231f5574ff80842a06d_LABS%20BLOG-%20Mongoose%20web%20server-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67353231f5574ff80842a06d_LABS%20BLOG-%20Mongoose%20web%20server-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67353231f5574ff80842a06d_LABS%20BLOG-%20Mongoose%20web%20server-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67353231f5574ff80842a06d_LABS%20BLOG-%20Mongoose%20web%20server.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Hunting the Mongoose: Discovering 10 Vulnerabilities in the Mongoose Web Server Library</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="trust-matters-uncovering-vulnerabilities-in-the-matter-protocol" /></div><div class="resource-page-item-grid-block"><a href="/blog/trust-matters-uncovering-vulnerabilities-in-the-matter-protocol" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6735bde3981b561fdfde85d6_Trust-Matters-Blog-FEATURED.webp" loading="lazy" alt="Trust Matters: Uncovering Vulnerabilities in the Matter Protocol" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6735bde3981b561fdfde85d6_Trust-Matters-Blog-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6735bde3981b561fdfde85d6_Trust-Matters-Blog-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6735bde3981b561fdfde85d6_Trust-Matters-Blog-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6735bde3981b561fdfde85d6_Trust-Matters-Blog-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Trust Matters: Uncovering Vulnerabilities in the Matter Protocol</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="preparing-for-nerc-cip-015-1-internal-network-security-monitoring-for-electric-utilities" /></div><div class="resource-page-item-grid-block"><a href="/blog/preparing-for-nerc-cip-015-1-internal-network-security-monitoring-for-electric-utilities" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5e3ff71e2bb28d01df24_NERC-CIP-FEATURED.webp" loading="lazy" alt="Preparing for NERC CIP-015-1: Internal Network Security Monitoring for Electric Utilities" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5e3ff71e2bb28d01df24_NERC-CIP-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5e3ff71e2bb28d01df24_NERC-CIP-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5e3ff71e2bb28d01df24_NERC-CIP-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5e3ff71e2bb28d01df24_NERC-CIP-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Preparing for NERC CIP-015-1: Internal Network Security Monitoring for Electric Utilities</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nis2-is-here-now-what" /></div><div class="resource-page-item-grid-block"><a href="/blog/nis2-is-here-now-what" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6721473fdeea100e231f4817_NIS2-Directive-What-Changed-BLOG.jpg" loading="lazy" alt="NIS2 Is Here. Now What?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6721473fdeea100e231f4817_NIS2-Directive-What-Changed-BLOG-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6721473fdeea100e231f4817_NIS2-Directive-What-Changed-BLOG-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6721473fdeea100e231f4817_NIS2-Directive-What-Changed-BLOG.jpg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">NIS2 Is Here. Now What?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="security-flaws-discovered-in-goahead-might-affect-web-servers-over-embedded-iot-devices" /></div><div class="resource-page-item-grid-block"><a href="/blog/security-flaws-discovered-in-goahead-might-affect-web-servers-over-embedded-iot-devices" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670984185367ac417cc3e900_GoAhead-FEATURED.webp" loading="lazy" alt="Security Flaws Discovered in GoAhead Might Affect Web Servers Over Embedded/IoT Devices" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670984185367ac417cc3e900_GoAhead-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670984185367ac417cc3e900_GoAhead-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670984185367ac417cc3e900_GoAhead-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670984185367ac417cc3e900_GoAhead-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Security Flaws Discovered in GoAhead Might Affect Web Servers Over Embedded/IoT Devices</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="get-ready-for-circia-and-nis2-cyber-incident-reporting" /></div><div class="resource-page-item-grid-block"><a href="/blog/get-ready-for-circia-and-nis2-cyber-incident-reporting" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fd81751be52341d517b25b_NIS2-CIRCIA-FEATURED.webp" loading="lazy" alt="Get Ready for CIRCIA and NIS2 Cyber Incident Reporting" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fd81751be52341d517b25b_NIS2-CIRCIA-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fd81751be52341d517b25b_NIS2-CIRCIA-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fd81751be52341d517b25b_NIS2-CIRCIA-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fd81751be52341d517b25b_NIS2-CIRCIA-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Get Ready for CIRCIA and NIS2 Cyber Incident Reporting</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="drafting-your-ot-security-dream-team" /></div><div class="resource-page-item-grid-block"><a href="/blog/drafting-your-ot-security-dream-team" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66eb445e3112047640f90fdc_OT-Security-Dream-Team-FEATURED.webp" loading="lazy" alt="Drafting Your OT Security Dream Team: Who Owns Purchasing, Deployment and Maintenance?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66eb445e3112047640f90fdc_OT-Security-Dream-Team-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66eb445e3112047640f90fdc_OT-Security-Dream-Team-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66eb445e3112047640f90fdc_OT-Security-Dream-Team-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66eb445e3112047640f90fdc_OT-Security-Dream-Team-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Drafting Your OT Security Dream Team: Who Owns Purchasing, Deployment and Maintenance?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-to-tap-doe-cybersecurity-funds-for-rural-municipal-small-investor-owned-utilities" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-to-tap-doe-cybersecurity-funds-for-rural-municipal-small-investor-owned-utilities" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e840115189ddde4729c632_Blog_Post_thumb_1200x628.webp" loading="lazy" alt="How to Tap DoE Cybersecurity Funds for Rural, Municipal & Small Investor-Owned Utilities" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e840115189ddde4729c632_Blog_Post_thumb_1200x628-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e840115189ddde4729c632_Blog_Post_thumb_1200x628-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e840115189ddde4729c632_Blog_Post_thumb_1200x628-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e840115189ddde4729c632_Blog_Post_thumb_1200x628.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">How to Tap DoE Cybersecurity Funds for Rural, Municipal & Small Investor-Owned Utilities</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="flaws-in-espressif-esp-now-allow-attackers-to-replay-communications" /></div><div class="resource-page-item-grid-block"><a href="/blog/flaws-in-espressif-esp-now-allow-attackers-to-replay-communications" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5a7bebb5f35e6505d4cc_Espressif-ESP-NOW-FEATURED.webp" loading="lazy" alt="Flaws in Espressif ESP-NOW Allow Attackers to Replay Communications" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5a7bebb5f35e6505d4cc_Espressif-ESP-NOW-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5a7bebb5f35e6505d4cc_Espressif-ESP-NOW-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5a7bebb5f35e6505d4cc_Espressif-ESP-NOW-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66db5a7bebb5f35e6505d4cc_Espressif-ESP-NOW-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Flaws in Espressif ESP-NOW Allow Attackers to Replay Communications</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="elevate-your-ot-iot-security-with-nozomi-dynamic-risk-scoring" /></div><div class="resource-page-item-grid-block"><a href="/blog/elevate-your-ot-iot-security-with-nozomi-dynamic-risk-scoring" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66d27adcc2c85fb9313d1ae0_Asset-Risk-Blog.webp" loading="lazy" alt="Elevate Your OT & IoT Security with Nozomi's Dynamic Risk Scoring " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66d27adcc2c85fb9313d1ae0_Asset-Risk-Blog-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66d27adcc2c85fb9313d1ae0_Asset-Risk-Blog-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66d27adcc2c85fb9313d1ae0_Asset-Risk-Blog-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66d27adcc2c85fb9313d1ae0_Asset-Risk-Blog.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Elevate Your OT & IoT Security with Nozomi's Dynamic Risk Scoring </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-and-mandiant-power-increased-awareness-and-response-to-ot-and-iot-threats" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-and-mandiant-power-increased-awareness-and-response-to-ot-and-iot-threats" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ba8ac7e3bcac383a97647f_TI-Expansion-Mandiant-BLOG.webp" loading="lazy" alt="Nozomi Networks and Mandiant Power Increased Awareness and Response to OT and IoT Threats" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ba8ac7e3bcac383a97647f_TI-Expansion-Mandiant-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ba8ac7e3bcac383a97647f_TI-Expansion-Mandiant-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ba8ac7e3bcac383a97647f_TI-Expansion-Mandiant-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ba8ac7e3bcac383a97647f_TI-Expansion-Mandiant-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks and Mandiant Power Increased Awareness and Response to OT and IoT Threats</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="four-vulnerabilities-in-beckhoff-twincat-bsd-could-allow-plc-logic-tampering-dos" /></div><div class="resource-page-item-grid-block"><a href="/blog/four-vulnerabilities-in-beckhoff-twincat-bsd-could-allow-plc-logic-tampering-dos" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b17ba6d661431798f2682a_Beckhoff-Vulns-FEATURED.webp" loading="lazy" alt="Four Vulnerabilities in Beckhoff TwinCAT/BSD Could Allow PLC Logic Tampering, DoS" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b17ba6d661431798f2682a_Beckhoff-Vulns-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b17ba6d661431798f2682a_Beckhoff-Vulns-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b17ba6d661431798f2682a_Beckhoff-Vulns-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b17ba6d661431798f2682a_Beckhoff-Vulns-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Four Vulnerabilities in Beckhoff TwinCAT/BSD Could Allow PLC Logic Tampering, DoS</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="37-vulnerabilities-in-openflow-libfluid-msg-parsing-library" /></div><div class="resource-page-item-grid-block"><a href="/blog/37-vulnerabilities-in-openflow-libfluid-msg-parsing-library" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b1b3b3b9ae001e69b35e97_libfluid-Vulnerability-FEATURED.webp" loading="lazy" alt="FluidFaults: 37 Vulnerabilities in the OpenFlow libfluid_msg Parsing Library" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b1b3b3b9ae001e69b35e97_libfluid-Vulnerability-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b1b3b3b9ae001e69b35e97_libfluid-Vulnerability-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b1b3b3b9ae001e69b35e97_libfluid-Vulnerability-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b1b3b3b9ae001e69b35e97_libfluid-Vulnerability-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">FluidFaults: 37 Vulnerabilities in the OpenFlow libfluid_msg Parsing Library</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vulnerabilities-in-johnson-controls-exacqvision-web-service-expose-security-systems-to-video-stream-hijacking" /></div><div class="resource-page-item-grid-block"><a href="/blog/vulnerabilities-in-johnson-controls-exacqvision-web-service-expose-security-systems-to-video-stream-hijacking" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a989bfc9eaf3933eb05d14_JCI-Tyco-exacqVision-FEATURED.webp" loading="lazy" alt="Vulnerabilities in Johnson Controls' exacqVision Web Service Expose Security Systems to Video-Stream Hijacking" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a989bfc9eaf3933eb05d14_JCI-Tyco-exacqVision-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a989bfc9eaf3933eb05d14_JCI-Tyco-exacqVision-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a989bfc9eaf3933eb05d14_JCI-Tyco-exacqVision-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a989bfc9eaf3933eb05d14_JCI-Tyco-exacqVision-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vulnerabilities in Johnson Controls' exacqVision Web Service Expose Security Systems to Video-Stream Hijacking</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-security-is-moving-to-the-endpoint-where-humans-interact" /></div><div class="resource-page-item-grid-block"><a href="/blog/ot-security-is-moving-to-the-endpoint-where-humans-interact" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a7a4866b515cac0a0941db_Why-OT-Security-Moving-to-Endpoint-FEATURED.webp" loading="lazy" alt="OT Security Is Moving to the Endpoint – Where Humans Interact " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a7a4866b515cac0a0941db_Why-OT-Security-Moving-to-Endpoint-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a7a4866b515cac0a0941db_Why-OT-Security-Moving-to-Endpoint-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a7a4866b515cac0a0941db_Why-OT-Security-Moving-to-Endpoint-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a7a4866b515cac0a0941db_Why-OT-Security-Moving-to-Endpoint-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">OT Security Is Moving to the Endpoint – Where Humans Interact </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="protecting-against-frostygoop-bustleberm-malware" /></div><div class="resource-page-item-grid-block"><a href="/blog/protecting-against-frostygoop-bustleberm-malware" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a12a6feb8ac2f297c5ace3_FrostyGoop-Bustleberm-FEATURED.webp" loading="lazy" alt="Cyberwarfare Targeting OT: Protecting Against FrostyGoop/BUSTLEBERM Malware" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a12a6feb8ac2f297c5ace3_FrostyGoop-Bustleberm-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a12a6feb8ac2f297c5ace3_FrostyGoop-Bustleberm-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a12a6feb8ac2f297c5ace3_FrostyGoop-Bustleberm-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66a12a6feb8ac2f297c5ace3_FrostyGoop-Bustleberm-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Cyberwarfare Targeting OT: Protecting Against FrostyGoop/BUSTLEBERM Malware</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="securing-critical-ics-assets-with-nozomi-arc-embedded" /></div><div class="resource-page-item-grid-block"><a href="/blog/securing-critical-ics-assets-with-nozomi-arc-embedded" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669c1f2fecadf7a5069cde0a_Arc_Embedded_MELSEC-FEATURED.webp" loading="lazy" alt="Securing Critical ICS Assets with Nozomi Arc Embedded" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669c1f2fecadf7a5069cde0a_Arc_Embedded_MELSEC-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669c1f2fecadf7a5069cde0a_Arc_Embedded_MELSEC-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669c1f2fecadf7a5069cde0a_Arc_Embedded_MELSEC-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669c1f2fecadf7a5069cde0a_Arc_Embedded_MELSEC-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Securing Critical ICS Assets with Nozomi Arc Embedded</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="crowdstrike-outage-what-nozomi-customers-need-to-know" /></div><div class="resource-page-item-grid-block"><a href="/blog/crowdstrike-outage-what-nozomi-customers-need-to-know" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669b12bd31c8299c45a5c195_Crowdstrike-FEATURED%20copy.webp" loading="lazy" alt="The CrowdStrike Outage: What Nozomi Customers Need to Know" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669b12bd31c8299c45a5c195_Crowdstrike-FEATURED%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669b12bd31c8299c45a5c195_Crowdstrike-FEATURED%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669b12bd31c8299c45a5c195_Crowdstrike-FEATURED%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669b12bd31c8299c45a5c195_Crowdstrike-FEATURED%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The CrowdStrike Outage: What Nozomi Customers Need to Know</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-evolving-panchan-botnet" /></div><div class="resource-page-item-grid-block"><a href="/blog/the-evolving-panchan-botnet" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669939a082293dfbc22e9976_Panchan-Botnet-FEATURED.webp" loading="lazy" alt="The Evolving Panchan Botnet" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669939a082293dfbc22e9976_Panchan-Botnet-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669939a082293dfbc22e9976_Panchan-Botnet-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669939a082293dfbc22e9976_Panchan-Botnet-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669939a082293dfbc22e9976_Panchan-Botnet-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The Evolving Panchan Botnet</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vulnerabilities-on-sensor-net-connect-and-thermoscan-ip-could-allow-admin-privileges-over-medical-data-systems" /></div><div class="resource-page-item-grid-block"><a href="/blog/vulnerabilities-on-sensor-net-connect-and-thermoscan-ip-could-allow-admin-privileges-over-medical-data-systems" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/666a61b5b296b9639bbc29ea_Sensor_Net_Connect_and_Thermoscan_IP_Vulnerabilities-FEATURED.webp" loading="lazy" alt="Vulnerabilities on Sensor Net Connect and Thermoscan IP Could Allow Admin Privileges Over Medical Data Systems" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/666a61b5b296b9639bbc29ea_Sensor_Net_Connect_and_Thermoscan_IP_Vulnerabilities-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/666a61b5b296b9639bbc29ea_Sensor_Net_Connect_and_Thermoscan_IP_Vulnerabilities-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/666a61b5b296b9639bbc29ea_Sensor_Net_Connect_and_Thermoscan_IP_Vulnerabilities-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/666a61b5b296b9639bbc29ea_Sensor_Net_Connect_and_Thermoscan_IP_Vulnerabilities-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vulnerabilities on Sensor Net Connect and Thermoscan IP Could Allow Admin Privileges Over Medical Data Systems</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="can-you-identify-your-critical-business-functions-and-their-technology-dependencies" /></div><div class="resource-page-item-grid-block"><a href="/blog/can-you-identify-your-critical-business-functions-and-their-technology-dependencies" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/667a4bcf921101b94b04bf29_ID-Business-Critical-Functions-FEATURED.webp" loading="lazy" alt="Can You Identify Your Critical Business Functions — and Their Technology Dependencies? " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/667a4bcf921101b94b04bf29_ID-Business-Critical-Functions-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/667a4bcf921101b94b04bf29_ID-Business-Critical-Functions-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/667a4bcf921101b94b04bf29_ID-Business-Critical-Functions-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/667a4bcf921101b94b04bf29_ID-Business-Critical-Functions-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Can You Identify Your Critical Business Functions — and Their Technology Dependencies? </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-labs-announces-vulnerabilities-affecting-the-ailux-rtu62351b-and-the-codename-i11usion-whitepaper" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-labs-announces-vulnerabilities-affecting-the-ailux-rtu62351b-and-the-codename-i11usion-whitepaper" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665de9ee60e95aac8b4d1cfe_Codename_I11usion-FEATURED.webp" loading="lazy" alt="Nozomi Networks Labs Announces Vulnerabilities Affecting the AiLux RTU62351B and the “Codename I11USION” Whitepaper" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665de9ee60e95aac8b4d1cfe_Codename_I11usion-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665de9ee60e95aac8b4d1cfe_Codename_I11usion-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665de9ee60e95aac8b4d1cfe_Codename_I11usion-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665de9ee60e95aac8b4d1cfe_Codename_I11usion-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Labs Announces Vulnerabilities Affecting the AiLux RTU62351B and the “Codename I11USION” Whitepaper</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="open-drone-id-nozomi-networks-adds-support-to-detect-drones-with-guardian-air" /></div><div class="resource-page-item-grid-block"><a href="/blog/open-drone-id-nozomi-networks-adds-support-to-detect-drones-with-guardian-air" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/664270c9dba760dfe4eddccc_ODID-Guardian-Air-FEATURED.webp" loading="lazy" alt="Open Drone ID: Nozomi Networks Adds Support to Detect Drones with Guardian Air" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/664270c9dba760dfe4eddccc_ODID-Guardian-Air-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/664270c9dba760dfe4eddccc_ODID-Guardian-Air-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/664270c9dba760dfe4eddccc_ODID-Guardian-Air-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/664270c9dba760dfe4eddccc_ODID-Guardian-Air-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Open Drone ID: Nozomi Networks Adds Support to Detect Drones with Guardian Air</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cisa-warns-of-pro-russia-hacktivist-ot-attacks-on-water-wastewater-sector" /></div><div class="resource-page-item-grid-block"><a href="/blog/cisa-warns-of-pro-russia-hacktivist-ot-attacks-on-water-wastewater-sector" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66476eb5dec56e95747ffa1e_CISA-Warns-Hacktivist-Attacks-On-Water-Wastewater-FEATURED%20copy.webp" loading="lazy" alt="CISA Warns of Pro-Russia Hacktivist OT Attacks on Water/Wastewater Sector " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66476eb5dec56e95747ffa1e_CISA-Warns-Hacktivist-Attacks-On-Water-Wastewater-FEATURED%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66476eb5dec56e95747ffa1e_CISA-Warns-Hacktivist-Attacks-On-Water-Wastewater-FEATURED%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66476eb5dec56e95747ffa1e_CISA-Warns-Hacktivist-Attacks-On-Water-Wastewater-FEATURED%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66476eb5dec56e95747ffa1e_CISA-Warns-Hacktivist-Attacks-On-Water-Wastewater-FEATURED%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">CISA Warns of Pro-Russia Hacktivist OT Attacks on Water/Wastewater Sector </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="what-nsm-22-means-for-critical-infrastructure-owners-and-operators" /></div><div class="resource-page-item-grid-block"><a href="/blog/what-nsm-22-means-for-critical-infrastructure-owners-and-operators" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6643634456a51719abf31c36_NSM-22-FEATURED.webp" loading="lazy" alt="What NSM-22 Means for Critical Infrastructure Owners and Operators" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6643634456a51719abf31c36_NSM-22-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6643634456a51719abf31c36_NSM-22-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6643634456a51719abf31c36_NSM-22-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6643634456a51719abf31c36_NSM-22-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">What NSM-22 Means for Critical Infrastructure Owners and Operators</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ge-healthcare-vivid-ultrasound-vulnerabilities" /></div><div class="resource-page-item-grid-block"><a href="/blog/ge-healthcare-vivid-ultrasound-vulnerabilities" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6642f3fffdb9a3647d3d0eeb_GE_Healthcare_Vulns-FEATURED.webp" loading="lazy" alt="Vulnerabilities on GE HealthCare Vivid Ultrasound Could Allow Malicious Insiders to Locally Install Ransomware, Access and Manipulate Patient Data" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6642f3fffdb9a3647d3d0eeb_GE_Healthcare_Vulns-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6642f3fffdb9a3647d3d0eeb_GE_Healthcare_Vulns-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6642f3fffdb9a3647d3d0eeb_GE_Healthcare_Vulns-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6642f3fffdb9a3647d3d0eeb_GE_Healthcare_Vulns-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vulnerabilities on GE HealthCare Vivid Ultrasound Could Allow Malicious Insiders to Locally Install Ransomware, Access and Manipulate Patient Data</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="detecting-ot-cybersecurity-threats-using-the-known-unknown-matrix" /></div><div class="resource-page-item-grid-block"><a href="/blog/detecting-ot-cybersecurity-threats-using-the-known-unknown-matrix" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663d1b0a5f817876d7b5997f_Unknown-Unknowns-Matrix-FEATURED.webp" loading="lazy" alt="Detecting OT Cybersecurity Threats Using the Known-Unknown Matrix " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663d1b0a5f817876d7b5997f_Unknown-Unknowns-Matrix-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663d1b0a5f817876d7b5997f_Unknown-Unknowns-Matrix-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663d1b0a5f817876d7b5997f_Unknown-Unknowns-Matrix-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663d1b0a5f817876d7b5997f_Unknown-Unknowns-Matrix-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Detecting OT Cybersecurity Threats Using the Known-Unknown Matrix </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="3-lessons-learned-from-liberty-eclipse-gridex-vii" /></div><div class="resource-page-item-grid-block"><a href="/blog/3-lessons-learned-from-liberty-eclipse-gridex-vii" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327bd673b8a3e0b022ac71_Lessons-Learned-from-Liberty-Eclipse-GridEx-FEATURED.webp" loading="lazy" alt="3 Lessons Learned from the Liberty Eclipse Exercise and GridEx VII " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327bd673b8a3e0b022ac71_Lessons-Learned-from-Liberty-Eclipse-GridEx-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327bd673b8a3e0b022ac71_Lessons-Learned-from-Liberty-Eclipse-GridEx-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327bd673b8a3e0b022ac71_Lessons-Learned-from-Liberty-Eclipse-GridEx-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327bd673b8a3e0b022ac71_Lessons-Learned-from-Liberty-Eclipse-GridEx-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">3 Lessons Learned from the Liberty Eclipse Exercise and GridEx VII </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vantage-iq-assistant-extends-ai-engine-into-query-creation" /></div><div class="resource-page-item-grid-block"><a href="/blog/vantage-iq-assistant-extends-ai-engine-into-query-creation" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327d6b66d773f5f6a73b63_IQ-Assistant-Update-BLOG.webp" loading="lazy" alt="Vantage IQ Assistant Extends AI Engine into Query Creation" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327d6b66d773f5f6a73b63_IQ-Assistant-Update-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327d6b66d773f5f6a73b63_IQ-Assistant-Update-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327d6b66d773f5f6a73b63_IQ-Assistant-Update-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66327d6b66d773f5f6a73b63_IQ-Assistant-Update-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vantage IQ Assistant Extends AI Engine into Query Creation</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="exploiting-healthcare-supply-chain-security-merge-dicom-toolkit" /></div><div class="resource-page-item-grid-block"><a href="/blog/exploiting-healthcare-supply-chain-security-merge-dicom-toolkit" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/662fc4134752255aec573bb0_Merative-DICOM-Vulnerability-FEATURED.webp" loading="lazy" alt="Exploiting Healthcare Supply Chain Security: Merge DICOM Toolkit" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/662fc4134752255aec573bb0_Merative-DICOM-Vulnerability-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/662fc4134752255aec573bb0_Merative-DICOM-Vulnerability-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/662fc4134752255aec573bb0_Merative-DICOM-Vulnerability-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/662fc4134752255aec573bb0_Merative-DICOM-Vulnerability-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Exploiting Healthcare Supply Chain Security: Merge DICOM Toolkit</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-ai-ml-are-transforming-ot-cybersecurity" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-ai-ml-are-transforming-ot-cybersecurity" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6617179f88f085851fdae3b9_Impact-Of-AI-BLOG.webp" loading="lazy" alt="How AI & ML Are Transforming OT Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6617179f88f085851fdae3b9_Impact-Of-AI-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6617179f88f085851fdae3b9_Impact-Of-AI-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6617179f88f085851fdae3b9_Impact-Of-AI-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6617179f88f085851fdae3b9_Impact-Of-AI-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">How AI & ML Are Transforming OT Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="whats-new-in-nozomi-networks-version-24" /></div><div class="resource-page-item-grid-block"><a href="/blog/whats-new-in-nozomi-networks-version-24" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/660dc8614fb03e9d2820b71a_Guardian-v24-FEATURED.webp" loading="lazy" alt="The Latest Nozomi Networks Platform Enhancements and Updates" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/660dc8614fb03e9d2820b71a_Guardian-v24-FEATURED-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/660dc8614fb03e9d2820b71a_Guardian-v24-FEATURED-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/660dc8614fb03e9d2820b71a_Guardian-v24-FEATURED-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/660dc8614fb03e9d2820b71a_Guardian-v24-FEATURED.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The Latest Nozomi Networks Platform Enhancements and Updates</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="dji-mavic-3-drone-research-part-2-vulnerability-analysis" /></div><div class="resource-page-item-grid-block"><a href="/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65fcb44d76707ebe5b05bcfb_NN-DJI-Mavic-3-Drone-Research-Part2-BLOG.webp" loading="lazy" alt="DJI Mavic 3 Drone Research Part 2: Vulnerability Analysis" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65fcb44d76707ebe5b05bcfb_NN-DJI-Mavic-3-Drone-Research-Part2-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65fcb44d76707ebe5b05bcfb_NN-DJI-Mavic-3-Drone-Research-Part2-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65fcb44d76707ebe5b05bcfb_NN-DJI-Mavic-3-Drone-Research-Part2-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65fcb44d76707ebe5b05bcfb_NN-DJI-Mavic-3-Drone-Research-Part2-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">DJI Mavic 3 Drone Research Part 2: Vulnerability Analysis</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="comprehensive-detection-is-needed-for-ot-and-iot-systems" /></div><div class="resource-page-item-grid-block"><a href="/blog/comprehensive-detection-is-needed-for-ot-and-iot-systems" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f49ac094ab6e9b6928ba7d_Comprehensive-Detection-BLOG.webp" loading="lazy" alt="Combining Passive and Active Detection in OT and IoT to Enhance Cyber Resilience" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f49ac094ab6e9b6928ba7d_Comprehensive-Detection-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f49ac094ab6e9b6928ba7d_Comprehensive-Detection-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f49ac094ab6e9b6928ba7d_Comprehensive-Detection-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f49ac094ab6e9b6928ba7d_Comprehensive-Detection-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Combining Passive and Active Detection in OT and IoT to Enhance Cyber Resilience</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-to-navigate-cyber-operational-risk-conversations-with-your-board" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-to-navigate-cyber-operational-risk-conversations-with-your-board" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ef492200f131a137e2c726_Redefining-Cyber-Risk-Management-BLOG.webp" loading="lazy" alt="How to Navigate Cyber & Operational Risk Conversations with Your Board" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ef492200f131a137e2c726_Redefining-Cyber-Risk-Management-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ef492200f131a137e2c726_Redefining-Cyber-Risk-Management-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ef492200f131a137e2c726_Redefining-Cyber-Risk-Management-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ef492200f131a137e2c726_Redefining-Cyber-Risk-Management-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">How to Navigate Cyber & Operational Risk Conversations with Your Board</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="understanding-the-current-threat-landscape-to-strengthen-ot-iot-security" /></div><div class="resource-page-item-grid-block"><a href="/blog/understanding-the-current-threat-landscape-to-strengthen-ot-iot-security" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65e0f6636e4bb8cabf54bf86_OT-IoT-Security-Report-2023-2H-Blog-BLOG.webp" loading="lazy" alt="Understanding the Current Threat Landscape to Strengthen OT & IoT Security" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65e0f6636e4bb8cabf54bf86_OT-IoT-Security-Report-2023-2H-Blog-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65e0f6636e4bb8cabf54bf86_OT-IoT-Security-Report-2023-2H-Blog-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65e0f6636e4bb8cabf54bf86_OT-IoT-Security-Report-2023-2H-Blog-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65e0f6636e4bb8cabf54bf86_OT-IoT-Security-Report-2023-2H-Blog-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Understanding the Current Threat Landscape to Strengthen OT & IoT Security</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-the-national-vulnerability-database-could-be-abused-to-spread-malware" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-the-national-vulnerability-database-could-be-abused-to-spread-malware" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65d9347bb69a51801b7018d7_National-Vulnerability-Database-BLOG.webp" loading="lazy" alt="How the National Vulnerability Database Could Be Abused to Spread Malware" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65d9347bb69a51801b7018d7_National-Vulnerability-Database-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65d9347bb69a51801b7018d7_National-Vulnerability-Database-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65d9347bb69a51801b7018d7_National-Vulnerability-Database-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65d9347bb69a51801b7018d7_National-Vulnerability-Database-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">How the National Vulnerability Database Could Be Abused to Spread Malware</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="new-release-isa-iec-62443-content-pack-version-2-0" /></div><div class="resource-page-item-grid-block"><a href="/blog/new-release-isa-iec-62443-content-pack-version-2-0" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65dcc5534a93c89103e77464_ISA-IEC-62443-Content-Pack-v2-BLOG.webp" loading="lazy" alt="New Release: ISA/IEC 62443 Content Pack Version 2.0" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">New Release: ISA/IEC 62443 Content Pack Version 2.0</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-labs-takes-on-the-armasuisse-ics-and-automotive-hackathons" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-labs-takes-on-the-armasuisse-ics-and-automotive-hackathons" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cd62fd99e8e3b2b37273fd_Automotive-Hackathons-BLOG.webp" loading="lazy" alt="Nozomi Networks Labs Takes on the Armasuisse ICS and Automotive Hackathons" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cd62fd99e8e3b2b37273fd_Automotive-Hackathons-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cd62fd99e8e3b2b37273fd_Automotive-Hackathons-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cd62fd99e8e3b2b37273fd_Automotive-Hackathons-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cd62fd99e8e3b2b37273fd_Automotive-Hackathons-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Labs Takes on the Armasuisse ICS and Automotive Hackathons</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="guardian-air-protects-against-wireless-cybersecurity-threats" /></div><div class="resource-page-item-grid-block"><a href="/blog/guardian-air-protects-against-wireless-cybersecurity-threats" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c15e879d0078613667a171_Guardian-Air-BLOG.webp" loading="lazy" alt="Guardian Air: When Protecting Wireless Environments Is a Priority " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c15e879d0078613667a171_Guardian-Air-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c15e879d0078613667a171_Guardian-Air-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c15e879d0078613667a171_Guardian-Air-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c15e879d0078613667a171_Guardian-Air-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Guardian Air: When Protecting Wireless Environments Is a Priority </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="isa-iec-62443-explained-best-practices-for-iacs-security" /></div><div class="resource-page-item-grid-block"><a href="/blog/isa-iec-62443-explained-best-practices-for-iacs-security" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b82a8fa04fca8061c6c241_ISA-IEC-62433-BLOG.webp" loading="lazy" alt="ISA/IEC 62443 Explained: Best Practices for IACS Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b82a8fa04fca8061c6c241_ISA-IEC-62433-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b82a8fa04fca8061c6c241_ISA-IEC-62433-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b82a8fa04fca8061c6c241_ISA-IEC-62433-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b82a8fa04fca8061c6c241_ISA-IEC-62433-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">ISA/IEC 62443 Explained: Best Practices for IACS Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cyber-threats-are-in-the-air-nozomi-networks-extends-detection-to-the-wireless-attack-surface" /></div><div class="resource-page-item-grid-block"><a href="/blog/cyber-threats-are-in-the-air-nozomi-networks-extends-detection-to-the-wireless-attack-surface" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00acb1db2a667ef53129f_Nozomi-Networks-Guardian-Air-Blog-BLOG-02.webp" loading="lazy" alt="Cyber Threats Are in the Air: Nozomi Networks Extends Detection to the Wireless Attack Surface " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00acb1db2a667ef53129f_Nozomi-Networks-Guardian-Air-Blog-BLOG-02-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00acb1db2a667ef53129f_Nozomi-Networks-Guardian-Air-Blog-BLOG-02-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00acb1db2a667ef53129f_Nozomi-Networks-Guardian-Air-Blog-BLOG-02-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00acb1db2a667ef53129f_Nozomi-Networks-Guardian-Air-Blog-BLOG-02.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Cyber Threats Are in the Air: Nozomi Networks Extends Detection to the Wireless Attack Surface </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="agrius-in-focus-dissecting-a-web-shell" /></div><div class="resource-page-item-grid-block"><a href="/blog/agrius-in-focus-dissecting-a-web-shell" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a8aca63663e691989b7aef_Web-Shells-BLOG.webp" loading="lazy" alt="Agrius in Focus: Dissecting a Web Shell" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a8aca63663e691989b7aef_Web-Shells-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a8aca63663e691989b7aef_Web-Shells-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a8aca63663e691989b7aef_Web-Shells-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a8aca63663e691989b7aef_Web-Shells-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Agrius in Focus: Dissecting a Web Shell</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-named-leader-in-frost-radar-for-ot-cybersecurity-solutions" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-named-leader-in-frost-radar-for-ot-cybersecurity-solutions" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a78ed2f18ab8c101dda38d_Frost-Sullivan-BLOG.webp" loading="lazy" alt="Nozomi Networks Named the Leader in the Frost Radar for OT Cybersecurity Solutions " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a78ed2f18ab8c101dda38d_Frost-Sullivan-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a78ed2f18ab8c101dda38d_Frost-Sullivan-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a78ed2f18ab8c101dda38d_Frost-Sullivan-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a78ed2f18ab8c101dda38d_Frost-Sullivan-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Named the Leader in the Frost Radar for OT Cybersecurity Solutions </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="p2pinfect-worm-evolves-to-target-a-new-platform" /></div><div class="resource-page-item-grid-block"><a href="/blog/p2pinfect-worm-evolves-to-target-a-new-platform" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a555f549d9320f071804e8_P2Pinfect-BLOG.webp" loading="lazy" alt="P2PInfect Worm Evolves to Target a New Platform " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a555f549d9320f071804e8_P2Pinfect-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a555f549d9320f071804e8_P2Pinfect-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a555f549d9320f071804e8_P2Pinfect-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65a555f549d9320f071804e8_P2Pinfect-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">P2PInfect Worm Evolves to Target a New Platform </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-cybersecurity-risk-management-for-cisos" /></div><div class="resource-page-item-grid-block"><a href="/blog/ot-cybersecurity-risk-management-for-cisos" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/659d93ec33f18c56d336b49c_CISOs-Guide-BLOG.webp" loading="lazy" alt="A CISO’s Guide to OT Security & Risk Management" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/659d93ec33f18c56d336b49c_CISOs-Guide-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/659d93ec33f18c56d336b49c_CISOs-Guide-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/659d93ec33f18c56d336b49c_CISOs-Guide-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/659d93ec33f18c56d336b49c_CISOs-Guide-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">A CISO’s Guide to OT Security & Risk Management</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vulnerabilities-on-bosch-rexroth-nutrunners" /></div><div class="resource-page-item-grid-block"><a href="/blog/vulnerabilities-on-bosch-rexroth-nutrunners" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6597359cac2ac556f474ded6_Bosch_Rexroth_Nutrunner_Vulns-BLOG.webp" loading="lazy" alt="Vulnerabilities on Bosch Rexroth Nutrunners May Be Abused to Stop Production Lines, Tamper with Safety-Critical Tightenings" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vulnerabilities on Bosch Rexroth Nutrunners May Be Abused to Stop Production Lines, Tamper with Safety-Critical Tightenings</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cisas-resilient-investment-planning-and-development-sets-cybersecurity-priorities" /></div><div class="resource-page-item-grid-block"><a href="/blog/cisas-resilient-investment-planning-and-development-sets-cybersecurity-priorities" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65848de6703093bd4816952f_CISAs-Resilient-Investment-Planning-BLOG.webp" loading="lazy" alt="CISA’s Resilient Investment Planning and Development Working Group Inadvertently Sets Cybersecurity Priorities" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65848de6703093bd4816952f_CISAs-Resilient-Investment-Planning-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65848de6703093bd4816952f_CISAs-Resilient-Investment-Planning-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65848de6703093bd4816952f_CISAs-Resilient-Investment-Planning-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65848de6703093bd4816952f_CISAs-Resilient-Investment-Planning-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">CISA’s Resilient Investment Planning and Development Working Group Inadvertently Sets Cybersecurity Priorities</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="metrics-mandates-and-management-trends-predictions-for-ot-security-in-2024" /></div><div class="resource-page-item-grid-block"><a href="/blog/metrics-mandates-and-management-trends-predictions-for-ot-security-in-2024" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/658096126eea3c5363a096fb_2024-Trends-Predictions-BLOG.webp" loading="lazy" alt="Metrics, Mandates, and Management: Trends & Predictions for OT Security in 2024" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/658096126eea3c5363a096fb_2024-Trends-Predictions-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/658096126eea3c5363a096fb_2024-Trends-Predictions-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/658096126eea3c5363a096fb_2024-Trends-Predictions-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/658096126eea3c5363a096fb_2024-Trends-Predictions-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Metrics, Mandates, and Management: Trends & Predictions for OT Security in 2024</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-labs-presents-zero-day-vulnerabilities-affecting-mitsubishi-electric-safety-plcs-at-black-hat-mea-23" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-labs-presents-zero-day-vulnerabilities-affecting-mitsubishi-electric-safety-plcs-at-black-hat-mea-23" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657b5fdf1c7c6609dc99ebd6_Black-Hat-MEA-BLOG.webp" loading="lazy" alt="Nozomi Networks Labs Presents Zero-Day Vulnerabilities Affecting Mitsubishi Electric Safety PLCs at Black Hat MEA 23" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657b5fdf1c7c6609dc99ebd6_Black-Hat-MEA-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657b5fdf1c7c6609dc99ebd6_Black-Hat-MEA-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657b5fdf1c7c6609dc99ebd6_Black-Hat-MEA-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657b5fdf1c7c6609dc99ebd6_Black-Hat-MEA-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Labs Presents Zero-Day Vulnerabilities Affecting Mitsubishi Electric Safety PLCs at Black Hat MEA 23</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="social-engineering-a-threat-to-operational-technology" /></div><div class="resource-page-item-grid-block"><a href="/blog/social-engineering-a-threat-to-operational-technology" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65735e4ebf98167d9a18b72e_Social-Engineering-BLOG.webp" loading="lazy" alt="Social Engineering: A Threat to Operational Technology? " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65735e4ebf98167d9a18b72e_Social-Engineering-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65735e4ebf98167d9a18b72e_Social-Engineering-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65735e4ebf98167d9a18b72e_Social-Engineering-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65735e4ebf98167d9a18b72e_Social-Engineering-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Social Engineering: A Threat to Operational Technology? </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="bosch-rexroth-ctrlx-hmi-wr21-browser-based-hmi-affected-by-multiple-security-flaws" /></div><div class="resource-page-item-grid-block"><a href="/blog/bosch-rexroth-ctrlx-hmi-wr21-browser-based-hmi-affected-by-multiple-security-flaws" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656113aab9997aae22319147_Bosch_Rexroth_HMI_ctrlx_TPC110W-BLOG.webp" loading="lazy" alt="Bosch Rexroth ctrlX HMI WR21 Browser-based HMI Affected by Multiple Security Flaws" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656113aab9997aae22319147_Bosch_Rexroth_HMI_ctrlx_TPC110W-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656113aab9997aae22319147_Bosch_Rexroth_HMI_ctrlx_TPC110W-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656113aab9997aae22319147_Bosch_Rexroth_HMI_ctrlx_TPC110W-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656113aab9997aae22319147_Bosch_Rexroth_HMI_ctrlx_TPC110W-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Bosch Rexroth ctrlX HMI WR21 Browser-based HMI Affected by Multiple Security Flaws</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="monitoring-hard-to-reach-devices-unique-protocols-in-utility-networks" /></div><div class="resource-page-item-grid-block"><a href="/blog/monitoring-hard-to-reach-devices-unique-protocols-in-utility-networks" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656f895091ba9c93bd998088_Monitoring-Hard-to-Reach-Devices-BLOG.webp" loading="lazy" alt="Monitoring Hard-to-Reach Devices and Unique Protocols in Utility Networks" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656f895091ba9c93bd998088_Monitoring-Hard-to-Reach-Devices-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656f895091ba9c93bd998088_Monitoring-Hard-to-Reach-Devices-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656f895091ba9c93bd998088_Monitoring-Hard-to-Reach-Devices-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656f895091ba9c93bd998088_Monitoring-Hard-to-Reach-Devices-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Monitoring Hard-to-Reach Devices and Unique Protocols in Utility Networks</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="five-vulnerabilities-on-sel-451-allow-authentication-bypass-and-dos" /></div><div class="resource-page-item-grid-block"><a href="/blog/five-vulnerabilities-on-sel-451-allow-authentication-bypass-and-dos" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656789a6cee2004e762cae23_SEL_451_Vulns-BLOG.webp" loading="lazy" alt="Five Vulnerabilities on SEL-451 Allow Authentication Bypass and DoS" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656789a6cee2004e762cae23_SEL_451_Vulns-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656789a6cee2004e762cae23_SEL_451_Vulns-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656789a6cee2004e762cae23_SEL_451_Vulns-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/656789a6cee2004e762cae23_SEL_451_Vulns-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Five Vulnerabilities on SEL-451 Allow Authentication Bypass and DoS</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-to-build-an-iot-honeypot" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-to-build-an-iot-honeypot" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6526f1ca3595ab5a7c5d7dc3_IoT-Honeypot-BLOG.webp" loading="lazy" alt="How to Build an IoT Honeypot" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6526f1ca3595ab5a7c5d7dc3_IoT-Honeypot-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6526f1ca3595ab5a7c5d7dc3_IoT-Honeypot-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6526f1ca3595ab5a7c5d7dc3_IoT-Honeypot-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6526f1ca3595ab5a7c5d7dc3_IoT-Honeypot-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">How to Build an IoT Honeypot</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="3-ways-to-diagnose-ot-network-issues-with-nozomi-networks" /></div><div class="resource-page-item-grid-block"><a href="/blog/3-ways-to-diagnose-ot-network-issues-with-nozomi-networks" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd5e32ea51bc25c9a1fa2_3-Way-Diagnose-BLOG.webp" loading="lazy" alt="3 Ways to Diagnose OT Network Issues with Nozomi Networks " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd5e32ea51bc25c9a1fa2_3-Way-Diagnose-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd5e32ea51bc25c9a1fa2_3-Way-Diagnose-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd5e32ea51bc25c9a1fa2_3-Way-Diagnose-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd5e32ea51bc25c9a1fa2_3-Way-Diagnose-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">3 Ways to Diagnose OT Network Issues with Nozomi Networks </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="what-is-operational-risk-assessing-sec-rule-readiness-for-ot-iot" /></div><div class="resource-page-item-grid-block"><a href="/blog/what-is-operational-risk-assessing-sec-rule-readiness-for-ot-iot" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650ca89ba6fa577850cc1a3b_SEC-Rule-Readiness-BLOG.webp" loading="lazy" alt="What is Operational Risk and Why Should You Care? Assessing SEC Rule Readiness for OT and IoT " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650ca89ba6fa577850cc1a3b_SEC-Rule-Readiness-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650ca89ba6fa577850cc1a3b_SEC-Rule-Readiness-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650ca89ba6fa577850cc1a3b_SEC-Rule-Readiness-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650ca89ba6fa577850cc1a3b_SEC-Rule-Readiness-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">What is Operational Risk and Why Should You Care? Assessing SEC Rule Readiness for OT and IoT </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="real-time-visibility-and-threat-detection-for-manufacturing-using-nozomi-networks-vantage-on-aws" /></div><div class="resource-page-item-grid-block"><a href="/blog/real-time-visibility-and-threat-detection-for-manufacturing-using-nozomi-networks-vantage-on-aws" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd4329ab36c60e8874d16_Real-Time-Visibility-AWS-BLOG.webp" loading="lazy" alt="Real-Time Visibility and Threat Detection for Manufacturing Using Nozomi Networks Vantage on AWS" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd4329ab36c60e8874d16_Real-Time-Visibility-AWS-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd4329ab36c60e8874d16_Real-Time-Visibility-AWS-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd4329ab36c60e8874d16_Real-Time-Visibility-AWS-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/655cd4329ab36c60e8874d16_Real-Time-Visibility-AWS-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Real-Time Visibility and Threat Detection for Manufacturing Using Nozomi Networks Vantage on AWS</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-labs-unveils-codename-i11usion-research-at-no-hat-23" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-labs-unveils-codename-i11usion-research-at-no-hat-23" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cff6b091cea8ac36f4f6ad_Codename-I11USION-BLOG.webp" loading="lazy" alt="Nozomi Networks Labs Unveils “Codename I11USION” Research at No Hat 23" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cff6b091cea8ac36f4f6ad_Codename-I11USION-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cff6b091cea8ac36f4f6ad_Codename-I11USION-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cff6b091cea8ac36f4f6ad_Codename-I11USION-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65cff6b091cea8ac36f4f6ad_Codename-I11USION-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Labs Unveils “Codename I11USION” Research at No Hat 23</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="4-essential-benefits-of-ot-asset-inventory-management" /></div><div class="resource-page-item-grid-block"><a href="/blog/4-essential-benefits-of-ot-asset-inventory-management" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654b9c38d304ae6daf7b3a77_4-Key-Benefits-of-an-OT-Asset-Management-Platform-BLOG.jpg" loading="lazy" alt="4 Essential Benefits of an OT Asset Management Platform" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654b9c38d304ae6daf7b3a77_4-Key-Benefits-of-an-OT-Asset-Management-Platform-BLOG-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654b9c38d304ae6daf7b3a77_4-Key-Benefits-of-an-OT-Asset-Management-Platform-BLOG-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654b9c38d304ae6daf7b3a77_4-Key-Benefits-of-an-OT-Asset-Management-Platform-BLOG-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654b9c38d304ae6daf7b3a77_4-Key-Benefits-of-an-OT-Asset-Management-Platform-BLOG.jpg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">4 Essential Benefits of an OT Asset Management Platform</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-continuous-monitoring" /></div><div class="resource-page-item-grid-block"><a href="/blog/ot-continuous-monitoring" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65528a4304d2b6013e0b9b1e_OT-Continuous-Monitoring-BLOG.webp" loading="lazy" alt="OT Continuous Monitoring – Hype or Hyperbole? " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65528a4304d2b6013e0b9b1e_OT-Continuous-Monitoring-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65528a4304d2b6013e0b9b1e_OT-Continuous-Monitoring-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65528a4304d2b6013e0b9b1e_OT-Continuous-Monitoring-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65528a4304d2b6013e0b9b1e_OT-Continuous-Monitoring-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">OT Continuous Monitoring – Hype or Hyperbole? </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="australian-security-of-critical-infrastructure-soci-act" /></div><div class="resource-page-item-grid-block"><a href="/blog/australian-security-of-critical-infrastructure-soci-act" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654a7ec676f2fdb123ee0650_SOCI-Legislation-Australia-BLOG.webp" loading="lazy" alt="No SOCI Puppets: Australia’s Focus on Critical Infrastructure Risk Management and Implications for Industrial Cybersecurity " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654a7ec676f2fdb123ee0650_SOCI-Legislation-Australia-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654a7ec676f2fdb123ee0650_SOCI-Legislation-Australia-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654a7ec676f2fdb123ee0650_SOCI-Legislation-Australia-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/654a7ec676f2fdb123ee0650_SOCI-Legislation-Australia-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">No SOCI Puppets: Australia’s Focus on Critical Infrastructure Risk Management and Implications for Industrial Cybersecurity </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="is-ot-cybersecurity-still-a-team-sport" /></div><div class="resource-page-item-grid-block"><a href="/blog/is-ot-cybersecurity-still-a-team-sport" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6542cb173bd3de098e166a6b_Organizational-Design-BLOG.webp" loading="lazy" alt="Organizational Design: Is OT Cybersecurity Still a Team Sport? " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6542cb173bd3de098e166a6b_Organizational-Design-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6542cb173bd3de098e166a6b_Organizational-Design-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6542cb173bd3de098e166a6b_Organizational-Design-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6542cb173bd3de098e166a6b_Organizational-Design-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Organizational Design: Is OT Cybersecurity Still a Team Sport? </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="securing-critical-rail-networks" /></div><div class="resource-page-item-grid-block"><a href="/blog/securing-critical-rail-networks" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651af9c76ff253bff30ce053_Critical-Railway-Networks-BLOG.webp" loading="lazy" alt="Protecting the Reliability of Critical Railway Networks " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651af9c76ff253bff30ce053_Critical-Railway-Networks-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651af9c76ff253bff30ce053_Critical-Railway-Networks-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651af9c76ff253bff30ce053_Critical-Railway-Networks-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651af9c76ff253bff30ce053_Critical-Railway-Networks-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Protecting the Reliability of Critical Railway Networks </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="security-flaws-affect-a-component-of-the-arduino-create-cloud-ide" /></div><div class="resource-page-item-grid-block"><a href="/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653167ea25c69fe2c713aab1_Arduino-Create-Agent-Vulns-BLOG.webp" loading="lazy" alt="Security Flaws Affect a Component of the Arduino Create Cloud IDE " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653167ea25c69fe2c713aab1_Arduino-Create-Agent-Vulns-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653167ea25c69fe2c713aab1_Arduino-Create-Agent-Vulns-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653167ea25c69fe2c713aab1_Arduino-Create-Agent-Vulns-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653167ea25c69fe2c713aab1_Arduino-Create-Agent-Vulns-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Security Flaws Affect a Component of the Arduino Create Cloud IDE </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="4-questions-cisos-need-to-answer-before-sec-deadline" /></div><div class="resource-page-item-grid-block"><a href="/blog/4-questions-cisos-need-to-answer-before-sec-deadline" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653915c6e685fd6ec27bf5d3_SEC-Deadlines-BLOG.webp" loading="lazy" alt="SEC Cyber Disclosure Rules: 4 Questions CISOs Need to Answer" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653915c6e685fd6ec27bf5d3_SEC-Deadlines-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653915c6e685fd6ec27bf5d3_SEC-Deadlines-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653915c6e685fd6ec27bf5d3_SEC-Deadlines-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/653915c6e685fd6ec27bf5d3_SEC-Deadlines-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">SEC Cyber Disclosure Rules: 4 Questions CISOs Need to Answer</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-3" /></div><div class="resource-page-item-grid-block"><a href="/blog/protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-3" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6513047a85f0e2db1f531c4a_Phoenix_Contact_Vulns-Part-3-BLOG%20copy.webp" loading="lazy" alt="Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 3" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6513047a85f0e2db1f531c4a_Phoenix_Contact_Vulns-Part-3-BLOG%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6513047a85f0e2db1f531c4a_Phoenix_Contact_Vulns-Part-3-BLOG%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6513047a85f0e2db1f531c4a_Phoenix_Contact_Vulns-Part-3-BLOG%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6513047a85f0e2db1f531c4a_Phoenix_Contact_Vulns-Part-3-BLOG%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 3</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ics-cybersecurity-guide" /></div><div class="resource-page-item-grid-block"><a href="/blog/ics-cybersecurity-guide" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/652af6caab8063a797f34f0c_ICS-Cybersecurity-BLOG.webp" loading="lazy" alt="ICS Cybersecurity Guide: Managing Risk in Industrial Operations" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/652af6caab8063a797f34f0c_ICS-Cybersecurity-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/652af6caab8063a797f34f0c_ICS-Cybersecurity-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/652af6caab8063a797f34f0c_ICS-Cybersecurity-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/652af6caab8063a797f34f0c_ICS-Cybersecurity-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">ICS Cybersecurity Guide: Managing Risk in Industrial Operations</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="merging-security-and-operational-asset-data-with-the-nozomi-networks-platform" /></div><div class="resource-page-item-grid-block"><a href="/blog/merging-security-and-operational-asset-data-with-the-nozomi-networks-platform" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65258bf45d13e9096bc17384_Merging-Security-and-Operational-Asset-Data-BLOG.webp" loading="lazy" alt="Merging Security and Operational Asset Data with the Nozomi Networks Platform" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65258bf45d13e9096bc17384_Merging-Security-and-Operational-Asset-Data-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65258bf45d13e9096bc17384_Merging-Security-and-Operational-Asset-Data-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65258bf45d13e9096bc17384_Merging-Security-and-Operational-Asset-Data-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65258bf45d13e9096bc17384_Merging-Security-and-Operational-Asset-Data-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Merging Security and Operational Asset Data with the Nozomi Networks Platform</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-2" /></div><div class="resource-page-item-grid-block"><a href="/blog/protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-2" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650de84633ebcceafb8f0b27_Phoenix_Contact_Vulns-Part-2-BLOG%20copy.webp" loading="lazy" alt="Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 2 " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650de84633ebcceafb8f0b27_Phoenix_Contact_Vulns-Part-2-BLOG%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650de84633ebcceafb8f0b27_Phoenix_Contact_Vulns-Part-2-BLOG%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650de84633ebcceafb8f0b27_Phoenix_Contact_Vulns-Part-2-BLOG%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/650de84633ebcceafb8f0b27_Phoenix_Contact_Vulns-Part-2-BLOG%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 2 </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="flaws-in-bently-nevada-3500-allow-attackers-to-bypass-authentication" /></div><div class="resource-page-item-grid-block"><a href="/blog/flaws-in-bently-nevada-3500-allow-attackers-to-bypass-authentication" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6509f8c796db2e3bedb66166_Bently-Nevada-Vulns-BLOG%20copy.webp" loading="lazy" alt="Flaws in Bently Nevada 3500 Allow Attackers to Bypass Authentication" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6509f8c796db2e3bedb66166_Bently-Nevada-Vulns-BLOG%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6509f8c796db2e3bedb66166_Bently-Nevada-Vulns-BLOG%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6509f8c796db2e3bedb66166_Bently-Nevada-Vulns-BLOG%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6509f8c796db2e3bedb66166_Bently-Nevada-Vulns-BLOG%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Flaws in Bently Nevada 3500 Allow Attackers to Bypass Authentication</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="9-new-vulnerabilities-impact-schweitzer-engineering-labs-software" /></div><div class="resource-page-item-grid-block"><a href="/blog/9-new-vulnerabilities-impact-schweitzer-engineering-labs-software" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64efeef9e74d04c1077e1490_SEL_Vulnerabilities_2-BLOG%20copy.webp" loading="lazy" alt="9 New Vulnerabilities Impact Schweitzer Engineering Labs Software Applications on Engineering Workstations" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64efeef9e74d04c1077e1490_SEL_Vulnerabilities_2-BLOG%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64efeef9e74d04c1077e1490_SEL_Vulnerabilities_2-BLOG%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64efeef9e74d04c1077e1490_SEL_Vulnerabilities_2-BLOG%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64efeef9e74d04c1077e1490_SEL_Vulnerabilities_2-BLOG%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">9 New Vulnerabilities Impact Schweitzer Engineering Labs Software Applications on Engineering Workstations</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="getting-to-know-the-nist-csf-2-0" /></div><div class="resource-page-item-grid-block"><a href="/blog/getting-to-know-the-nist-csf-2-0" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64e3b7e4bb5734e1e857add3_NIST-CSF-BLOG-1024x536.webp" loading="lazy" alt="Two Truths and a Lie: Getting to Know the NIST CSF 2.0" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64e3b7e4bb5734e1e857add3_NIST-CSF-BLOG-1024x536-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64e3b7e4bb5734e1e857add3_NIST-CSF-BLOG-1024x536-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64e3b7e4bb5734e1e857add3_NIST-CSF-BLOG-1024x536.webp 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Two Truths and a Lie: Getting to Know the NIST CSF 2.0</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="14-vulnerabilities-discovered-in-phoenix-contact-hmis" /></div><div class="resource-page-item-grid-block"><a href="/blog/14-vulnerabilities-discovered-in-phoenix-contact-hmis" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d2babf77a2e3e729c6f4fe_Phoenix_Contact_Vulns-BLOG-768x402.webp" loading="lazy" alt="Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 1" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d2babf77a2e3e729c6f4fe_Phoenix_Contact_Vulns-BLOG-768x402-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d2babf77a2e3e729c6f4fe_Phoenix_Contact_Vulns-BLOG-768x402.webp 768w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 1</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="six-vulnerabilities-found-in-axis-camera-systems-license-plate-verifier-application" /></div><div class="resource-page-item-grid-block"><a href="/blog/six-vulnerabilities-found-in-axis-camera-systems-license-plate-verifier-application" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d28ab725a49f6798e40ec1_Axis_License_Plate_Verifier_vulnerabilities-BLOG.jpeg" loading="lazy" alt="Six Vulnerabilities Found in Axis Camera Systems License Plate Verifier Application" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d28ab725a49f6798e40ec1_Axis_License_Plate_Verifier_vulnerabilities-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d28ab725a49f6798e40ec1_Axis_License_Plate_Verifier_vulnerabilities-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64d28ab725a49f6798e40ec1_Axis_License_Plate_Verifier_vulnerabilities-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Six Vulnerabilities Found in Axis Camera Systems License Plate Verifier Application</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="new-nozomi-networks-labs-report-august-2023" /></div><div class="resource-page-item-grid-block"><a href="/blog/new-nozomi-networks-labs-report-august-2023" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ca608ac0df4c6b7303ed62_Nozomi-Networks-OT-IoT-Security-Report-2023-1H-cover-1-1024x536.webp" loading="lazy" alt="New Report: Nozomi Networks Labs Finds Defenses Are Improving But Threats Continue to Rise" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ca608ac0df4c6b7303ed62_Nozomi-Networks-OT-IoT-Security-Report-2023-1H-cover-1-1024x536-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ca608ac0df4c6b7303ed62_Nozomi-Networks-OT-IoT-Security-Report-2023-1H-cover-1-1024x536-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ca608ac0df4c6b7303ed62_Nozomi-Networks-OT-IoT-Security-Report-2023-1H-cover-1-1024x536.webp 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">New Report: Nozomi Networks Labs Finds Defenses Are Improving But Threats Continue to Rise</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="driving-ndaa-section-1505-compliance-with-nozomi-networks" /></div><div class="resource-page-item-grid-block"><a href="/blog/driving-ndaa-section-1505-compliance-with-nozomi-networks" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b84aec5214cc555fe88dd2_NDAA-1505-BLOG-768x402.webp" loading="lazy" alt="Driving NDAA Section 1505 Compliance with Nozomi Networks" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b84aec5214cc555fe88dd2_NDAA-1505-BLOG-768x402-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b84aec5214cc555fe88dd2_NDAA-1505-BLOG-768x402.webp 768w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Driving NDAA Section 1505 Compliance with Nozomi Networks</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-discovers-three-vulnerabilities-affecting-bluemark-dronescout-ds230-remote-id-receiver" /></div><div class="resource-page-item-grid-block"><a href="/blog/nozomi-networks-discovers-three-vulnerabilities-affecting-bluemark-dronescout-ds230-remote-id-receiver" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b0335bf78ba966b505a5d2_DroneScout-BLOG-768x402.webp" loading="lazy" alt="Nozomi Networks Discovers Three Vulnerabilities Affecting BlueMark DroneScout ds230 Remote ID Receiver " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b0335bf78ba966b505a5d2_DroneScout-BLOG-768x402-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64b0335bf78ba966b505a5d2_DroneScout-BLOG-768x402.webp 768w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Discovers Three Vulnerabilities Affecting BlueMark DroneScout ds230 Remote ID Receiver </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="sec-cybersecurity-rules-using-the-sox-model-to-get-it-right" /></div><div class="resource-page-item-grid-block"><a href="/blog/sec-cybersecurity-rules-using-the-sox-model-to-get-it-right" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87b131ac0d8467874bb43_SOX-for-Cyber-BLOG.webp" loading="lazy" alt="SEC Cybersecurity Rules: Using the SOX Model to Get It Right" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87b131ac0d8467874bb43_SOX-for-Cyber-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87b131ac0d8467874bb43_SOX-for-Cyber-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87b131ac0d8467874bb43_SOX-for-Cyber-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87b131ac0d8467874bb43_SOX-for-Cyber-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">SEC Cybersecurity Rules: Using the SOX Model to Get It Right</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-2" /></div><div class="resource-page-item-grid-block"><a href="/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-2" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87d18d558b9f04048c851_BMC-Firmware-Part2-BLOG.webp" loading="lazy" alt="Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 2" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87d18d558b9f04048c851_BMC-Firmware-Part2-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87d18d558b9f04048c851_BMC-Firmware-Part2-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87d18d558b9f04048c851_BMC-Firmware-Part2-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a87d18d558b9f04048c851_BMC-Firmware-Part2-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 2</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="are-european-companies-ready-for-nis2-implementation" /></div><div class="resource-page-item-grid-block"><a href="/blog/are-european-companies-ready-for-nis2-implementation" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a37277ec74b78e8314d967_Responsibility-for-OT-Cybersecurity-European-Edition-BLOG-1024x536.webp" loading="lazy" alt="Are European Companies Ready for NIS2 Implementation?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a37277ec74b78e8314d967_Responsibility-for-OT-Cybersecurity-European-Edition-BLOG-1024x536-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a37277ec74b78e8314d967_Responsibility-for-OT-Cybersecurity-European-Edition-BLOG-1024x536-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a37277ec74b78e8314d967_Responsibility-for-OT-Cybersecurity-European-Edition-BLOG-1024x536.webp 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Are European Companies Ready for NIS2 Implementation?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="using-ai-to-enhance-asset-intelligence" /></div><div class="resource-page-item-grid-block"><a href="/blog/using-ai-to-enhance-asset-intelligence" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d2b256d10e35bc3ecb84_Asset-Intelligence-Update-BLOG.webp" loading="lazy" alt="Using AI to Enhance Asset Intelligence" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d2b256d10e35bc3ecb84_Asset-Intelligence-Update-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d2b256d10e35bc3ecb84_Asset-Intelligence-Update-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d2b256d10e35bc3ecb84_Asset-Intelligence-Update-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d2b256d10e35bc3ecb84_Asset-Intelligence-Update-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Using AI to Enhance Asset Intelligence</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="uwb-rtls-vulnerability-confirmed-in-ubisense-dimension4-3d-tracking-system" /></div><div class="resource-page-item-grid-block"><a href="/blog/uwb-rtls-vulnerability-confirmed-in-ubisense-dimension4-3d-tracking-system" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a36f0ee20bb4386d3e0b75_UWB-Ubisense-Vulnerability-BLOG-1024x536.webp" loading="lazy" alt="Previously Disclosed UWB RTLS Vulnerability Confirmed in Ubisense Dimension4 3D Tracking System" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a36f0ee20bb4386d3e0b75_UWB-Ubisense-Vulnerability-BLOG-1024x536-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a36f0ee20bb4386d3e0b75_UWB-Ubisense-Vulnerability-BLOG-1024x536-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a36f0ee20bb4386d3e0b75_UWB-Ubisense-Vulnerability-BLOG-1024x536.webp 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Previously Disclosed UWB RTLS Vulnerability Confirmed in Ubisense Dimension4 3D Tracking System</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="moveit-vulnerabilities-hacked-what-critical-infrastructure-organizations-can-do-to-stay-safe" /></div><div class="resource-page-item-grid-block"><a href="/blog/moveit-vulnerabilities-hacked-what-critical-infrastructure-organizations-can-do-to-stay-safe" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649f2c33090bdd66a321ed5d_CL0P-MoveIT-Vulnerability-BLOG-1024x536.webp" loading="lazy" alt="MOVEit Vulnerabilities Hacked - What Critical Infrastructure Organizations Can Do to Stay Safe " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649f2c33090bdd66a321ed5d_CL0P-MoveIT-Vulnerability-BLOG-1024x536-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649f2c33090bdd66a321ed5d_CL0P-MoveIT-Vulnerability-BLOG-1024x536-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649f2c33090bdd66a321ed5d_CL0P-MoveIT-Vulnerability-BLOG-1024x536.webp 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">MOVEit Vulnerabilities Hacked - What Critical Infrastructure Organizations Can Do to Stay Safe </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nerc-internal-network-security-monitoring-insm-standard" /></div><div class="resource-page-item-grid-block"><a href="/blog/nerc-internal-network-security-monitoring-insm-standard" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffdee7cae0d4ade7bf_INSM-Electric-Sector-BLOG.jpeg" loading="lazy" alt="NERC’s Internal Network Security Monitoring (INSM) Standard: Why and Why Now?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffdee7cae0d4ade7bf_INSM-Electric-Sector-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffdee7cae0d4ade7bf_INSM-Electric-Sector-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffdee7cae0d4ade7bf_INSM-Electric-Sector-BLOG-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffdee7cae0d4ade7bf_INSM-Electric-Sector-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">NERC’s Internal Network Security Monitoring (INSM) Standard: Why and Why Now?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-security-best-practices" /></div><div class="resource-page-item-grid-block"><a href="/blog/ot-security-best-practices" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500.jpeg" loading="lazy" alt="OT Security: What Makes It Hard & How Can I Master It?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-1600.jpeg 1600w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-2000.jpeg 2000w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-2600.jpeg 2600w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500-p-3200.jpeg 3200w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64886514cc3ed80088f5e9e5_64877c804b619f099ba660d8_Digital-concept-networking-and-big-data-1320780025_8000x4500.jpeg 8000w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">OT Security: What Makes It Hard & How Can I Master It?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="vantage-iq-is-your-new-intelligent-cybersecurity-assistant" /></div><div class="resource-page-item-grid-block"><a href="/blog/vantage-iq-is-your-new-intelligent-cybersecurity-assistant" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65bc25b490fb9add11623e4d_Nozomi-Networks-Vantage-IQ-BLOG.webp" loading="lazy" alt="Vantage IQ Is Your New Intelligent Cybersecurity Assistant, Increasing Efficiency and Vigilance" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65bc25b490fb9add11623e4d_Nozomi-Networks-Vantage-IQ-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65bc25b490fb9add11623e4d_Nozomi-Networks-Vantage-IQ-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65bc25b490fb9add11623e4d_Nozomi-Networks-Vantage-IQ-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65bc25b490fb9add11623e4d_Nozomi-Networks-Vantage-IQ-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Vantage IQ Is Your New Intelligent Cybersecurity Assistant, Increasing Efficiency and Vigilance</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="19-new-vulnerabilities-found-in-sel-real-time-automation-controllers" /></div><div class="resource-page-item-grid-block"><a href="/blog/19-new-vulnerabilities-found-in-sel-real-time-automation-controllers" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc3f712309dc98e5d_SEL-Vulnerabilities-BLOG.jpeg" loading="lazy" alt="19 New Vulnerabilities Found in SEL Real Time Automation Controllers" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc3f712309dc98e5d_SEL-Vulnerabilities-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc3f712309dc98e5d_SEL-Vulnerabilities-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc3f712309dc98e5d_SEL-Vulnerabilities-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">19 New Vulnerabilities Found in SEL Real Time Automation Controllers</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="whats-new-in-nozomi-networks-version-23-0" /></div><div class="resource-page-item-grid-block"><a href="/blog/whats-new-in-nozomi-networks-version-23-0" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d8d46dc366aca42ac689_Guardian-v23-BLOG.webp" loading="lazy" alt="What's New in Nozomi Networks' Version 23.0?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d8d46dc366aca42ac689_Guardian-v23-BLOG-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d8d46dc366aca42ac689_Guardian-v23-BLOG-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d8d46dc366aca42ac689_Guardian-v23-BLOG-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b2d8d46dc366aca42ac689_Guardian-v23-BLOG.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">What's New in Nozomi Networks' Version 23.0?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ethos-emerging-threat-open-sharing-platform" /></div><div class="resource-page-item-grid-block"><a href="/blog/ethos-emerging-threat-open-sharing-platform" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc2fd0bfcf4178260_Ethos-Blog.jpeg" loading="lazy" alt="The ETHOS Open-Source Initiative: Emerging Threat Open Sharing Platform" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc2fd0bfcf4178260_Ethos-Blog-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc2fd0bfcf4178260_Ethos-Blog.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The ETHOS Open-Source Initiative: Emerging Threat Open Sharing Platform</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ensuring-cybersecurity-of-medical-devices-fdc-act" /></div><div class="resource-page-item-grid-block"><a href="/blog/ensuring-cybersecurity-of-medical-devices-fdc-act" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff5888f8d542992ac3_Security-Malice-Afterthought-BLOG.jpeg" loading="lazy" alt="The Malice of Security as an Afterthought: New Medical Cybersecurity Regulations and Guidelines" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff5888f8d542992ac3_Security-Malice-Afterthought-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff5888f8d542992ac3_Security-Malice-Afterthought-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff5888f8d542992ac3_Security-Malice-Afterthought-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The Malice of Security as an Afterthought: New Medical Cybersecurity Regulations and Guidelines</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-challenges-of-ics-vulnerability-assessment-process" /></div><div class="resource-page-item-grid-block"><a href="/blog/the-challenges-of-ics-vulnerability-assessment-process" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8db4b3b66f1fc030_ICS-Vulnerability-Assessment-BLOG.jpeg" loading="lazy" alt="The Challenges of the Vulnerability Assessment Process in ICS Space" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8db4b3b66f1fc030_ICS-Vulnerability-Assessment-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8db4b3b66f1fc030_ICS-Vulnerability-Assessment-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8db4b3b66f1fc030_ICS-Vulnerability-Assessment-BLOG-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8db4b3b66f1fc030_ICS-Vulnerability-Assessment-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The Challenges of the Vulnerability Assessment Process in ICS Space</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="using-mitre-attack-for-ics-framework" /></div><div class="resource-page-item-grid-block"><a href="/blog/using-mitre-attack-for-ics-framework" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64c42bb3534786a275d32bb2_MITRE-feature-1200x628-1.webp" loading="lazy" alt="Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IoT Threat Response" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64c42bb3534786a275d32bb2_MITRE-feature-1200x628-1-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64c42bb3534786a275d32bb2_MITRE-feature-1200x628-1-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64c42bb3534786a275d32bb2_MITRE-feature-1200x628-1-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64c42bb3534786a275d32bb2_MITRE-feature-1200x628-1.webp 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IoT Threat Response</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="dji-mavic-3-drone-research-part-1-firmware-analysis" /></div><div class="resource-page-item-grid-block"><a href="/blog/dji-mavic-3-drone-research-part-1-firmware-analysis" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8d480dcaed2473a9_NN-DJI-Mavic-3-Drone-Research-Part1-BLOG.jpeg" loading="lazy" alt="DJI Mavic 3 Drone Research Part 1: Firmware Analysis" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8d480dcaed2473a9_NN-DJI-Mavic-3-Drone-Research-Part1-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8d480dcaed2473a9_NN-DJI-Mavic-3-Drone-Research-Part1-BLOG-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ff8d480dcaed2473a9_NN-DJI-Mavic-3-Drone-Research-Part1-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">DJI Mavic 3 Drone Research Part 1: Firmware Analysis</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="new-release-isa-iec-62443-content-pack" /></div><div class="resource-page-item-grid-block"><a href="/blog/new-release-isa-iec-62443-content-pack" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc7c45793ad62e39e_ISA-IEC-62443-Content-Pack-BLOG.jpeg" loading="lazy" alt="New Release: ISA/IEC 62443 Content Pack" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc7c45793ad62e39e_ISA-IEC-62443-Content-Pack-BLOG-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/648864ffc7c45793ad62e39e_ISA-IEC-62443-Content-Pack-BLOG.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">New Release: ISA/IEC 62443 Content Pack</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="importance-of-iot-ot-endpoint-detection-in-security" /></div><div class="resource-page-item-grid-block"><a href="/blog/importance-of-iot-ot-endpoint-detection-in-security" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d10df968af7557644b_Malicious_USB_HID.jpeg" loading="lazy" alt="The Importance of Physical Access Endpoint Detection in OT & IoT" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d10df968af7557644b_Malicious_USB_HID-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d10df968af7557644b_Malicious_USB_HID-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d10df968af7557644b_Malicious_USB_HID-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d10df968af7557644b_Malicious_USB_HID.jpeg 1200w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">The Importance of Physical Access Endpoint Detection in OT & IoT</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="a-guide-to-healthcare-cybersecurity" /></div><div class="resource-page-item-grid-block"><a href="/blog/a-guide-to-healthcare-cybersecurity" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a72ea5d8b08d8893bed179_Hospital-Emergency-Room-Entrance-139610675_4736x3008-1536x976.webp" loading="lazy" alt="A Guide to Healthcare Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a72ea5d8b08d8893bed179_Hospital-Emergency-Room-Entrance-139610675_4736x3008-1536x976-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a72ea5d8b08d8893bed179_Hospital-Emergency-Room-Entrance-139610675_4736x3008-1536x976-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a72ea5d8b08d8893bed179_Hospital-Emergency-Room-Entrance-139610675_4736x3008-1536x976-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64a72ea5d8b08d8893bed179_Hospital-Emergency-Room-Entrance-139610675_4736x3008-1536x976.webp 1536w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">A Guide to Healthcare Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-will-chatgpt-affect-cybersecurity" /></div><div class="resource-page-item-grid-block"><a href="/blog/how-will-chatgpt-affect-cybersecurity" class="blog-page-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d1e80c72f99cc5bf87_ChatGPT-AI-for-Cybersecurity.jpeg" loading="lazy" alt="ChatGPT-4: AI’s Evolving Capabilities and Consequences for Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d1e80c72f99cc5bf87_ChatGPT-AI-for-Cybersecurity-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d1e80c72f99cc5bf87_ChatGPT-AI-for-Cybersecurity-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646273d1e80c72f99cc5bf87_ChatGPT-AI-for-Cybersecurity.jpeg 1024w" class="resource-page-item-grid-image image-div-fit image-div-fit-blog"/><h2 class="resource-page-resource-block-item-header">ChatGPT-4: AI’s Evolving Capabilities and Consequences for Cybersecurity</h2></a></div></div></div><div role="navigation" aria-label="List" class="w-pagination-wrapper"><a href="?2c2e3edc_page=2" aria-label="Next Page" class="w-pagination-next"><div class="w-inline-block">Next</div><svg class="w-pagination-next-icon" height="12px" width="12px" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 12 12" transform="translate(0, 1)"><path fill="none" stroke="currentColor" fill-rule="evenodd" d="M4 2l4 4-4 4"></path></svg></a><link rel="prerender" href="?2c2e3edc_page=2"/></div></div><div class="load-more-button-wrapper"><a href="#" class="nozomi-button jetboost-pagination-next-zx9k w-button">Load More</a></div></div></div></div></div></div></section><section class="footer"><div id="subscribe" class="footer-subscribe-wrapper"><div class="footer-subscribe-container"><div class="footer-subscribe-embed-box w-embed w-script"><script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script> <script> hbspt.forms.create({ region: "na1", portalId: "2724979", formId: "a03466a4-e367-45ac-8a9f-8739114a494c" }); </script> <div style="max-width: 350px; margin-left: 0; margin-right: auto; padding-top: 5px;"><a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" style="font-size: 10px; line-height: 18px; color: #F5F5F7; font-family: Montserrat;">View our Privacy Policy</a></div></div></div></div><div class="footer-top-navigation-bar"><div class="footer-container footer-link-bar-container w-container"><div class="footer-top-navigation-bar-wrapper"><div class="footer-navigation-logo-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0bbe5862d58545496b67_nozomi-blue-icon.svg" loading="lazy" alt="" class="image"/></div><a data-w-id="63fd2949-137e-d5f8-88d1-14e184102f83" href="#" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Subscribe</h2></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">LinkedIn</h2></a><a href="/demo" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Demo</h2></a></div></div></div><div class="footer-navigation-link-field-wrapper"><div class="footer-container w-container"><div class="w-layout-grid footer-link-field-grid"><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102f8f-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">PLATFORM</h3><a href="/products" class="footer-link">Platform Overview</a><a href="/products/vantage" class="footer-link">Vantage</a><a href="/products/central-management-console" class="footer-link">Central Management Console</a><a href="/products/guardian" class="footer-link">Guardian</a><a href="/products/guardian-air" class="footer-link">Guardian Air</a><a href="/products/arc" class="footer-link">Arc</a><a href="/products/asset-intelligence" class="footer-link">Asset Intelligence</a><a href="/products/threat-intelligence" class="footer-link">Threat Intelligence</a><a href="/products/smart-polling" class="footer-link">Smart Polling</a><a href="https://security.nozominetworks.com/" target="_blank" class="footer-link">PSIRT</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fa0-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Professional Services</h3><a href="/professional-services" class="footer-link">Overview</a><a href="/professional-services/solution-design" class="footer-link">Design</a><a href="/professional-services/solution-deployment" class="footer-link">Deployment</a><a href="/professional-services/fast-track-service-packages" class="footer-link">Fast Track</a><a href="/professional-services/solution-optimization" class="footer-link">Optimization</a><a href="/professional-services/project-management" class="footer-link">Project Management</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fad-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Business needs</h3><a href="/solutions/threat-detection-and-response" class="footer-link">Threat Detection & Response</a><a href="/solutions/iot-ot-network-monitoring" class="footer-link">Continuous Network Monitoring</a><a href="/solutions/iot-ot-asset-inventory-management" class="footer-link">Asset Inventory Management</a><a href="/solutions/iot-ot-vulnerability-management" class="footer-link">Risk & Vulnerability Management</a><a href="/solutions/iot-security" class="footer-link">IoT Security</a><a href="/solutions/data-center-cybersecurity" class="footer-link">Data Center Cybersecurity</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fbc-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Compliance</h3><a href="/compliance/nerc-cip" class="footer-link">NERC CIP</a><a href="/compliance/nis2-directive-compliance" class="footer-link">NIS2 Directive</a><a href="/compliance/tsa-security-directives" class="footer-link">TSA Security Directives</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fc9-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Industry</h3><a href="/industries/airport-cybersecurity" class="footer-link">Airports</a><a href="/industries/electric-utilities-cybersecurity" class="footer-link">Electric Utilities</a><a href="/industries/healthcare-cybersecurity" class="footer-link">Healthcare</a><a href="/industries/federal-government" class="footer-link">Federal Government</a><a href="/industries/manufacturing-cybersecurity" class="footer-link">Manufacturing</a><a href="/industries/maritime-cybersecurity" class="footer-link">Maritime</a><a href="/industries/mining-cybersecurity" class="footer-link">Mining</a><a href="/industries/oil-gas-cybersecurity" class="footer-link">Oil & Gas</a><a href="/industries/pharmaceutical-cybersecurity" class="footer-link">Pharmaceutical</a><a href="/industries/rail-cybersecurity" class="footer-link">Rail</a><a href="/industries/retail-cybersecurity" class="footer-link">Retail</a><a href="/industries/smart-cities-cybersecurity" class="footer-link">Smart Cities</a><a href="/industries/water-wastewater-cybersecurity" class="footer-link">Water & Wastewater</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fe4-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Learn</h3><a href="/partners" class="footer-link">Partners</a><a href="/resources" class="footer-link">Resources</a><a href="/company" class="footer-link">Company</a><a href="/company/contact-us" class="footer-link">Contact Us</a><a href="/academy" class="footer-link">Academy</a><a href="/company/careers" class="footer-link">Careers</a><a href="/labs" class="footer-link">Labs</a><a href="https://www.nozominetworks.com/legal/privacy-policy" class="footer-link">Legal</a><div class="footer-social-icon-wrapper"><a href="https://twitter.com/nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64e91608e818b441814b52e8_twitter_footer_22x18.svg" loading="lazy" width="42" height="100" alt="" class="footer-social-icon"/></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5111954ec5d275cd99_linkedin.svg" loading="lazy" alt="Linkedin logo" class="footer-social-icon"/></a><a href="https://www.youtube.com/@nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5133e547a9cb765948_youtube.svg" loading="lazy" alt="" class="footer-social-icon"/></a></div></div></div></div></div><div class="footer-copyright-wrapper"><div class="footer-container w-container"><div class="footer-copyright-text">© 2024 Nozomi Networks Inc. All Rights Reserved. <a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" class="footer-copyright-link">Privacy Policy</a> and Certifications. <a href="#" class="footer-copyright-link">System Status</a>.</div></div></div></section><script src="https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=645a4534705010e2cb244f50" type="text/javascript" integrity="sha256-9/aliU8dGd2tb6OSsuzixeV4y/faTqgFtohetphbbj0=" crossorigin="anonymous"></script><script src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/js/nozomi-2023.3991b2fee.js" type="text/javascript"></script><link rel="alternate" hreflang="en" href="https://www.nozominetworks.com/blog"> <link rel="alternate" hreflang="ja" href="https://ja.nozominetworks.com/blog"> <script type="text/javascript" src="https://cdn.weglot.com/weglot.min.js"></script> <script> Weglot.initialize({ api_key: 'wg_f524bcd5524f694e7a49cc49e108186a4' }); </script></body></html>