Japan sets up task force against Mythos AI threats
Anthropic’s revelation that the Mythos model is capable of instantly compromising critical operating systems triggered an immediate response at the…
Attacks on US critical infrastructure. How Iran exploited flaws in the OT
The national security architecture faces a paradoxical challenge in which the most advanced defense systems are brought to…
Physical AI: A groundbreaking trend in the evolution of artificial intelligence in the real world
Przejście od czysto kognitywnych modeli językowych ku Physical AI wyznacza nowy horyzont, w którym sztuczna inteligencja opuszcza bezpieczne…
OT cyber security, a new pillar of profitability for energy companies
The energy sector has finally abandoned the illusion of stability, becoming an arena where geopolitical interests intersect with…
A factory is not an office. Why do IT methods fail in manufacturing security and how to do it right?
Many industrial companies still labor under the misconception that traditional IT security measures are sufficient to protect critical…
OT cyber security at the target of ransomware. How one mistake leads to production paralysis
The convergence of information technology (IT) and operational technology (OT) is accelerating, but its implementation is still fraught…
Operational transformation: How the OT market is growing in Polish industry
Operational technology (OT) - i.e. industrial control, automation and critical infrastructure systems - has become a pillar of…
