BxC Magazine

Stay ahead with insights and solutions for
evolving cybersecurity challenges.

OT Security Strategy

How to plan a long-term ICS cybersecurity strategies based on a structured methodology

learn more

IAM in connected OT

learn more

Shifting the Cyber Focus

learn more

PKI as an enabler for a secure industry 4.0

learn more

How Our Cyber Language Shapes the Way We Think

learn more

OT Security Assessments

learn more

Secure IIoT Sensor Integration

learn more

Cyber Security: Lead by Context, not by Control in Cyber

learn more

The Dangerous Average

learn more

The Pratfall Effect & Cybersecurity

learn more

Why network micro-segmentation can be counterproductive

learn more

Why stopping cybersecurity programs should not be taboo

learn more

The Libero Role in Digitalization Projects

learn more

The Certification Balance

learn more

Colonial Pipeline Attack Recap

learn more

What Is the Purdue Model for ICS Security?

learn more

Definition and Explanation of Operational Technology (OT) Security

learn more

Top 5 Cyber Threats for Manufacturing Companies

learn more

Women in Cyber: BlackHoodie at Troopers 2023 in Heidelberg

learn more

OT Security Guide - Where to start?

learn more

Definition and explanation of OT network segmentation

learn more

PKI Integration for Legacy Infrastructure

learn more

What is XDR and which benefits can it bring to OT Security?

learn more

Securing Cyberspace: Waterfall or Agile? Determining the Right Fit for Your Company

learn more

Securely Integrating PKI Functionality in Legacy Environments: BxC's Expert Solutions

learn more

Why is cybersecurity crucial for manufacturing?

learn more

Lessons learned from GICSP certification

learn more

Navigating the Certificate Lifecycle Management Landscape

learn more