Whitepaper

A Perfect Storm: How OT Became the Most Consequential Cybersecurity Plane Practically Overnight