๐ŸŽ™๏ธ On this Nexus Podcast recorded LIVE from โ˜€๏ธ S4 Conference in Miami, #cybersecurity expert Mike Holcomb discusses how state actors may be leveraging hacktivists to target operational technology (#OT).

Holcomb has delineated these groups in what he calls a Converged Actor Framework that categorizes threat actors by the impact and frequency of their incidents. A converged actor is potentially the riskiest given the potential for high frequency high impact incidents.

๐ŸŽง Full episode: https://nexusconnect.io/podcasts/nexus-podcast-mike-holcomb-on-the-intersection-of-hacktivists-and-state-actors

#S4x26 #OperationalTechnology #RiskManagement #CyberResilience"

๐Ÿ–๐Ÿ’ targets to hit. Don't miss the User Pillar. ๐ŸŽฏ

The new ๐Ÿ“ƒ DoW Zero Trust guidance sets ๐Ÿ–๐Ÿ’ activities as the OT baseline. The hardest part? Managing third-party risk.

Claroty Secure Remote Access - built for #OT - solves the User access puzzle:
๐Ÿ”ธ Just-in-Time: Time-based access & auto-revocation
๐Ÿ”ธ Accountability: Record and monitor every session
๐Ÿ”ธ Least Privilege: Password vaults and role-based, least privilege access for 3rd parties

๐Ÿ” Built for OT. Ready for ZT.

Learn more: https://claroty.com/public-sector-cybersecurity/secure-access

#FederalOTSecurity #ZeroTrustforOT #ClarotyFederal #IndustrialCyber #CyberSecurity #OperationalTechnology #Infosec #Defense #DoW

Russell Township police email cut off for weeks after suspected intrusion flagged in Ohio county network #CyberIncident #Ohio #Police #EmailSecurity #VPN #OperationalTechnology https://dysruptionhub.com/russell-police-email-block-ohio/
Russell Township police email cut off for weeks after suspected intrusion flagged in Ohio county network

Russell Township Police lost email after Sept. 8 incident; county cited Russia/Spain DNS and Microsoft 365 Direct Send. Restored via .gov in Nov.

DysruptionHub

JLRโ€™s disclosure that a September 2025 cyberattack contributed to a 43% decline in Q3 wholesale volumes illustrates how cyber incidents translate directly into operational downtime, financial loss, and third-party risk.

Extended recovery timelines, supplier liquidity stress, and government intervention emphasize the importance of:

- Incident containment
- OT and manufacturing security
- Supply-chain cyber resilience planning

How should large industrial firms rethink cyber risk modeling after cases like this?

Follow @technadu for objective infosec and risk-focused reporting.

#Infosec #CyberRisk #OperationalTechnology #SupplyChainSecurity #IncidentResponse #BusinessImpact

#1 OT/ICS CYBERSECURITY TRAINING AND MACHINE LEARNING TRAINING IN DELHI NCR AND IN INDIA
#OTCybersecurity #ICSSecurity #IndustrialCybersecuriTY #CriticalInfrastructure #OperationalTechnology #TheEvolvEdge
#IndustrialAutomation #NetworK
visit-www.theevolvedge.com
mail-info@theevolvedge.com
oh no - +917982403420 ,+919311805027
#1 OT/ICS CYBERSECURITY TRAINING IN DELHI NCR AND IN INDIA
#OTCybersecurity #ICSSecurity #IndustrialCybersecuriTY #CriticalInfrastructure #OperationalTechnology #TheEvolvEdge
#IndustrialAutomation #NetworK
visit-www.theevolvedge.com
mail-info@theevolvedge.com
oh no - +917982403420 ,+919311805027
Industrial routers on the front line of attacks

New data shows industrial routers are now the most attacked devices in OT environments, drawing 67 percent of all malicious activity in Forescoutโ€™s 90-day

BetaNews

US CISA

Publication 3.12.2025

Principles for the Secure Integration of Artificial Intelligence in Operational Technology

https://www.cisa.gov/resources-tools/resources/principles-secure-integration-artificial-intelligence-operational-technology

#CISA #ArtificialIntelligence #OperationalTechnology

Why, finally, all eyes are on OT [Q&A]

We spoke to David Montoya, Paessler global business development manager OT/IoT, to discuss how the OT landscape has evolved and why businesses need to be on

BetaNews