The excessive use of remote access tools in OT environments can increase the attack surface, complicate identity management, and hinder visibility.

The post Study Finds Excessive Use of Remote Access Tools in OT Environments appeared first on SecurityWeek.