Insights & News
[{id=193675018560, createdAt=1753906677955, updatedAt=1769806160997, name='From Investment to Impact: How Utilities Can Optimize Value From OT Security Platform Investments', 16='{type=list, value=[{id=88922020963, name='Managed Security Services'}, {id=186396035703, name='Security Consulting Services'}]}', 1='{type=string, value=From Investment to Impact: How Utilities Can Optimize Value From OT Security Platform Investments}', 2='{type=image, value=Image{width=1600,height=650,url='https://477837.fs1.hubspotusercontent-na1.net/hubfs/477837/1898_Web_Assets/News/From-Investment-to-Impact-How-Utilities-Can-Optimize-Value-From-OT-Security-Platform-Investments-hero.webp',altText='From Investment to Impact: How Utilities Can Optimize Value From OT Security Platform Investments',fileId=194099330148}}', 18='{type=number, value=0}', 3='{type=number, value=1753833600000}', 19='{type=number, value=0}', 4='{type=string, value=From rapid load growth to maintaining reliability in the face of increasingly extreme weather, utilities must navigate unprecedented challenges and opportunities.}', 25='{type=string, value=Utility Dive}', 10='{type=list, value=[{id=2, name='1898 & Co.', order=1, label='1898 & Co.'}]}', 14='{type=string, value=https://1898andco.burnsmcd.com/hubfs/Collateral-1898/From-Investment-to-Impact-How-Utilities-Can-Optimize-Value-From-OT-Security-Platform-Investments.pdf}', 15='{type=list, value=[{id=63936101196, name='Power'}]}'}, {id=207530817109, createdAt=1771005720799, updatedAt=1771006155526, name='Safeguarding critical infrastructure: Utility cybersecurity priorities for an evolving threat landscape', 16='{type=list, value=[{id=88911618055, name='Industrial Cybersecurity'}, {id=186396035703, name='Security Consulting Services'}, {id=204819625275, name='Operational Technology Services'}]}', 1='{type=string, value=Safeguarding critical infrastructure: Utility cybersecurity priorities for an evolving threat landscape}', 2='{type=image, value=Image{width=1920,height=700,url='https://477837.fs1.hubspotusercontent-na1.net/hubfs/477837/1898_Web_Assets/2022%20Site%20Assets/1898-Generic-Hero-Overlay.jpg',altText='1898-Generic-Hero-Overlay',fileId=99087870347}}', 18='{type=number, value=0}', 3='{type=number, value=1761696000000}', 19='{type=number, value=0}', 4='{type=string, value=Utilities in 2025 are facing an environment where sophisticated state-sponsored and criminal threat actors lurk in the digital shadows. The increasingly global nature of cyber warfare and direct attacks on critical infrastructure reinforce the importance of prioritizing cybersecurity as an organization-wide imperative.}', 20='{type=list, value=[{id=126790203306, name='Victor Atkins'}]}', 25='{type=string, value=Renewable Energy World}', 10='{type=list, value=[{id=2, name='1898 & Co.', order=1, label='1898 & Co.'}]}', 14='{type=string, value=https://www.renewableenergyworld.com/power-grid/safeguarding-critical-infrastructure-utility-cybersecurity-priorities-for-an-evolving-threat-landscape/}'}, {id=209454890097, createdAt=1773757950798, updatedAt=1773758199618, name='Why industrial cybersecurity must evolve as climate disruption and digitalization reshape critical infrastructure', 16='{type=list, value=[{id=88911618055, name='Industrial Cybersecurity'}, {id=186396035703, name='Security Consulting Services'}, {id=186409358920, name='Cybersecurity Strategy & Risk'}]}', 1='{type=string, value=Why industrial cybersecurity must evolve as climate disruption and digitalization reshape critical infrastructure}', 2='{type=image, value=Image{width=1920,height=700,url='https://477837.fs1.hubspotusercontent-na1.net/hubfs/477837/1898_Web_Assets/2022%20Site%20Assets/1898-Generic-Hero-Overlay.jpg',altText='1898-Generic-Hero-Overlay',fileId=99087870347}}', 18='{type=number, value=0}', 3='{type=number, value=1773532800000}', 19='{type=number, value=0}', 4='{type=string, value=Industrial threat landscape is increasingly influenced by extreme weather events, which are exposing new vulnerabilities and expanding the cyberattack surface across critical infrastructure. There is a convergence of IT and OT, as well as the extensive use of cloud technology, which has become a significant factor in motivating organizations to improve security.}', 20='{type=list, value=[{id=78920674936, name='Tim Gale'}]}', 25='{type=string, value=Industrial Cyber}', 10='{type=list, value=[{id=2, name='1898 & Co.', order=1, label='1898 & Co.'}]}', 14='{type=string, value=https://industrialcyber.co/features/why-industrial-cybersecurity-must-evolve-as-climate-disruption-and-digitalization-reshape-critical-infrastructure/}', 15='{type=list, value=[{id=63936101196, name='Power'}]}'}]