OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues.
First seen on darkreading.com
Jump to article: www.darkreading.com/cyberattacks-data-breaches/critical-infrastructure-back-office-data
![]()

