Transparently Insecure Operational Technology: A Contextual Analysis
In cybersecurity, countering threats depends on an ability to see and respond to attacks. However, in operational technology, transparency is a double-edged sword. Some of the same connectivity developed to dynamically manage cyber physical systems also exposes vulnerabilities to attackers.
This...