Data collected by IBM shows that old and inconspicuous vulnerabilities affecting industrial products are commonly targeted in scanning activity seen by organizations that use operational technology (OT). SecurityWeek has talked to several experts to find out what this data means and determine the threat posed by these security holes.
- Posted on
- By SecurityIT
- In ICS/OT, Management & Strategy, NEWS & INDUSTRY, Risk Management, Virus & Threats


