Annelien2024-10-30T14:42:57+00:00Don’t forget your operational technology in your NIS2 assessmentAnnelien2024-10-30T14:42:57+00:0030/10/2024|Knowledge center|
Annelien2024-10-10T08:39:58+00:00IT and OT Security, a Crucial Synergy for Optimal ProtectionAnnelien2024-10-10T08:39:58+00:0010/10/2024|Knowledge center|
Annelien2024-10-01T13:14:18+00:00Strengthen Your OT Security: Identifying Vulnerabilities and Maturing Your Defences Against Cyber ThreatsAnnelien2024-10-01T13:14:18+00:0001/10/2024|Knowledge center|
Annelien2024-09-11T10:44:01+00:00Qinexo and SoterICS Announce Strategic Partnership in OT ManagementAnnelien2024-09-11T10:44:01+00:0011/09/2024|Knowledge center|
Annelien2024-08-27T14:45:59+00:00Understanding the NIS2 Directive: Enhance Your Cybersecurity and Ensure ComplianceAnnelien2024-08-27T14:45:59+00:0027/08/2024|Knowledge center|
Annelien2024-08-16T11:15:34+00:00Why Traditional SOCs Won’t Work for OTAnnelien2024-08-16T11:15:34+00:0016/08/2024|Knowledge center|
Annelien2024-05-27T11:55:19+00:00SoterICS and TXOne Networks announce partnership to strengthen OT securityAnnelien2024-05-27T11:55:19+00:0028/05/2024|Press releases|
Annelien2024-05-28T13:57:48+00:00Master the Language of OT Security: a Comprehensive GlossaryAnnelien2024-05-28T13:57:48+00:0023/05/2024|Knowledge center|
admin2024-08-27T14:49:46+00:00Unraveling the Mystery of OT Security: Common Misconceptions and Challengesadmin2024-08-27T14:49:46+00:0008/05/2024|Knowledge center|