MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun
The Last Watchdog
OCTOBER 8, 2018
And by compromising activities on the IT side, stealing credentials, deploying phishing emails, and infecting websites with drive-by malware, criminals can infiltrate the OT network. Countries with limited military might and financial resources can create a more level battleground for themselves by engaging in cyber battles.
Let's personalize your content