BxC Magazine

Stay ahead with insights and solutions for
evolving cybersecurity challenges.

Strategy

OT Security Strategy

How to plan a long-term ICS cybersecurity strategies based on a structured methodology

learn more

Strategy

OT Security Strategy

learn more

Attack

Colonial Pipeline Attack Recap

learn more

Management

Cyber Security: Lead by Context, not by Control in Cyber

learn more

Cybersecurity

Definition and Explanation of Operational Technology (OT) Security

learn more

Network Security

Definition and explanation of OT network segmentation

learn more

Management

How Our Cyber Language Shapes the Way We Think

learn more

Identity Access Management

IAM in connected OT

learn more

Cybersecurity

Lessons learned from GICSP certification

learn more

Public Key Infrastructure

Navigating the Certificate Lifecycle Management Landscape

learn more

Risk

OT Security Assessments

learn more

OT Security Guide - Where to start?

learn more

Public Key Infrastructure

PKI Integration for Legacy Infrastructure

learn more

Public Key Infrastructure

PKI as an enabler for a secure industry 4.0

learn more

Industrial IoT

Secure IIoT Sensor Integration

learn more

Public Key Infrastructure

Securely Integrating PKI Functionality in Legacy Environments: BxC's Expert Solutions

learn more

Management

Securing Cyberspace: Waterfall or Agile? Determining the Right Fit for Your Company

learn more

Strategy

Shifting the Cyber Focus

learn more

Management

The Certification Balance

learn more

Risk

The Dangerous Average

learn more

Industrial IoT

The Libero Role in Digitalization Projects

learn more

Cybersecurity

The Operational Technology (OT) Glossary

learn more

Management

The Pratfall Effect & Cybersecurity

learn more

Risk

Top 5 Cyber Threats for Manufacturing Companies

learn more

Strategy

What Is the Purdue Model for ICS Security?

learn more

Network Security

What is XDR and which benefits can it bring to OT Security?

learn more

Strategy

Why is cybersecurity crucial for manufacturing?

learn more

Network Security

Why network micro-segmentation can be counterproductive

learn more

Management

Why stopping cybersecurity programs should not be taboo

learn more

Cybersecurity

Women in Cyber: BlackHoodie at Troopers 2023 in Heidelberg

learn more

No data available