Latest News and Trends

Israeli OT Cybersecurity Startups (2): Siga elevates OT cybersecurity to ‘Level Zero’

It is critical to have security systems in place that prevent any unauthorized personnel from gaining access to your company’s system. If an attacker were able to, they could gain control over the victim’s programmable logic controllers (PLCs) and all upper-level communication-based tools of the Purdue model. (For readers who are not familiar with the Purdue model, it is basically a model that helps to define the architecture of operational technologies (OT) and information technology (IT).)