Transparently Insecure Operational Technology: A Contextual Analysis

In cybersecurity, countering threats depends on an ability to see and respond to attacks. However, in operational technology, transparency is a double-edged sword. Some of the same connectivity developed to dynamically manage cyber physical systems also exposes vulnerabilities to attackers. This...
Mary Gutierrez-May
January 6, 2022

All papers are copyrighted. No re-posting of papers is permitted