TXOne: Industrial Security Is Evolving to Keep the Operation RunningTXOne: Industrial Security Is Evolving to Keep the Operation Running
Terence Liu and Jeff DePasse of TXOne Networks joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss operational technology, critical infrastructure, and the National Cybersecurity Strategy.
Terence Liu and Jeff DePasse of TXOne Networks talk about the heightened profile of critical infrastructure in the National Cybersecurity Strategy, as well whether policies for information technology can also work for operational technology (OT). They discuss the kinds of threats that are reshaping the evolution of industrial security solutions. Liu and DePasse also share their thoughts on the efficacy of zero trust in OT applications.
Dr. Terence Liu is the CEO of TXOne Networks, a global leader in industrial cybersecurity that provides practical solutions to secure and accelerate the progress of automation and data exchange in the industrial world. TXOne Networks' customized solutions are designed specifically for operational technology (OT) environments and industrial control systems (ICS) to ensure their reliability and safety from cyberattacks.
Jeff DePasse leads the TXOne Networks Americas team with over 22 years of experience in cybersecurity. He has held various sales, channel, and management roles across 5 different organizations including Cylance and Trend Micro.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage