• Platform
    • Supply Chain Security
    • Supply Chain Intelligence
  • Solutions
    • Solutions Overview
    • Solutions Overview
    • AI Data Center Security
    • Device Lifecycle Management
    • Digital Supply Chain
      Security
    • Firmware Security
      for Enterprises
    • Regulatory Compliance
    • Zero Trust
      for Endpoints
  • Resources
      • Resources Overview
      • All Resources
      • CASE STUDIES
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • SOLUTION BRIEFS
      • THREAT REPORTS
      • WHITE PAPERS
      • Blog
      • Newsletter
      • Public Sector
      • Support
      • Latest Blogs
        Blog, RESEARCH

        BadCam: Now Weaponizing Linux Webcams

        Learn more
        Blog

        What the White House’s AI Action Plan Means for Infrastructure and Cybersecurity Leaders

        Learn more
  • Research
  • Company
    • Company Overview
    • Company Overview
    • Team
    • Newsroom
    • Careers
    • Partners
    • Contact
  • US
  • JP
  • Get a demo
  • Take a Tour
  • US
  • JP
  • Get a demo
  • Take a Tour
  • Platform
    • Supply Chain Security
    • Supply Chain Intelligence
  • Solutions
    • Solutions Overview
    • Solutions Overview
    • AI Data Center Security
    • Device Lifecycle Management
    • Digital Supply Chain
      Security
    • Firmware Security
      for Enterprises
    • Regulatory Compliance
    • Zero Trust
      for Endpoints
  • Resources
      • Resources Overview
      • All Resources
      • CASE STUDIES
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • SOLUTION BRIEFS
      • THREAT REPORTS
      • WHITE PAPERS
      • Blog
      • Newsletter
      • Public Sector
      • Support
      • Latest Blogs
        Blog, RESEARCH

        BadCam: Now Weaponizing Linux Webcams

        Learn more
        Blog

        What the White House’s AI Action Plan Means for Infrastructure and Cybersecurity Leaders

        Learn more
  • Research
  • Company
    • Company Overview
    • Company Overview
    • Team
    • Newsroom
    • Careers
    • Partners
    • Contact
PODCASTS

BTS #33 - Securing OT Environments - Dr. Ed Harris

By: Eclypsium
July 3, 2024
Eclypsium presents Below The Surface text on top of ocean waves

Ed Harris joins us to discuss how to secure OT environments, implement effective air gaps, and more!

Show Notes

Subscribe

Back to Blog
Related Blogs
View all
PODCASTS

BTS #56 - Vulnerabilities & Backdoors In IT Infrastructure

Read more
PODCASTS

BTS #55 - Netgear, Gigabyte, and Rowhammer Vulnerabilities

Read more
PODCASTS

BTS #54 - CVE-2024-54085: The First of Its Kind

Read more
PODCASTS

BTS #53 - Exploring the Evolution of Zero Trust

Read more
Eclypsium | Supply Chain Security for the Modern Enterprise
Get a Demo Contact Us
Platform
  • Title
    • Supply Chain Security
    • Supply Chain Intelligence
Research
Solutions
  • Title
    • Digital Supply Chain Security
    • Firmware Security for Enterprises
    • Compliance
    • Zero Trust for Endpoints
Resources
  • Title
    • Blog
    • Events
    • Podcasts
    • White Papers
    • Support
  • Title
    • Solution Briefs
    • Threat Reports
    • Newsletter
Company
  • Title
    • Team
    • Newsroom
    • Careers
    • Partners
    • Security
    • Contact
  • Linkedin
  • Youtube
  • Twitter
  • Facebook
© 2025 Eclypsium, Inc.
Privacy Policy | Terms of Use | Sitemap