With a quarter of all detected cyber-attacks against industry, hardening our resistance is key to taking increasing advantages of process and informational data – without secure systems, our advantages are compromised. A Zero Trust Architecture works through identification, verification and authorization, all of which are conducted periodically. It sounds heavy and costly but does not have to be as onerous as it sounds. In any case, the approach is one that can inform key approaches that MUST be done to protect our businesses.

Forbes,  August 16th., 2023.

Cyber Safety for Manufacturing