In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...
All content for The OT and IoT Security Podcast is the property of Nozomi Networks and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incident does occur.Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and OT Cybersecurity Strategist Danielle Jablanski.V...
The OT and IoT Security Podcast
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...