Business & Technology
Most firms use IT tools for OT security, study finds
SOFIAH NICHOLE SALIVIO
News Editor
e2e-assure has published research showing that nearly one in three organisations rely on IT detection platforms adapted for operational technology. The study surveyed 250 cybersecurity decision-makers across manufacturing, utilities, transport, government and defence.
The findings highlight a gap between the tools many organisations use to monitor industrial environments and the demands of OT and industrial control systems. Some 32 per cent of respondents said they rely on detection platforms built for IT and later adapted for OT, while only 15 per cent have deployed passive visibility tools designed specifically for industrial control systems.
This shortfall comes amid disruption from cyber incidents. Among those surveyed, 63 per cent said incidents in the past year had caused direct operational downtime or affected critical OT or ICS systems.
Coordination gaps
The study also highlights weaknesses in how organisations manage security across converged IT and OT environments. It found that 28 per cent still depend on manual or ad hoc coordination between IT and OT security teams, while 37 per cent use a shared platform across both environments.
These figures suggest many businesses have yet to establish a joined-up approach to incident handling in operational settings, where response times and system visibility can directly affect production and services.
Richard Groome, OT Cybersecurity Specialist at e2e-assure, said: “Most adapted IT platforms struggle in OT because they’re still thinking like IT tools. They can identify anomalies, but they often have no understanding of their business impact. OT downtime isn’t just a network problem; it’s a process problem. If you can’t interpret what an alert means for a running plant or production line, you’re not preventing downtime, you’re just creating noise.”
The research argues that extending established IT security platforms into OT environments can leave teams with large volumes of data but limited understanding of its operational meaning. In practice, that can make it harder to assess whether an alert threatens a live process, production line or critical service.
Connectivity is adding further pressure. The survey found that 70 per cent of organisations have fully or largely integrated cloud-connected environments into their IT and OT security strategies, increasing the complexity of managing exposure across systems designed with different priorities.
Groome said: “The volume of data being ingested is often not understood or actionable, meaning incidents may still be missed. More connected does not automatically mean more secure, particularly where exposure increases faster than coordinated response capability.”
Rising costs
The financial impact of OT disruption also featured in the findings. Previously shared research found that 23 per cent of the most severe OT downtime incidents cost more than £1 million, while 6 per cent exceeded £5 million.
That cost backdrop appears to be influencing spending priorities. The survey found that 63 per cent of leaders are increasing budgets for workforce training and role clarity, making this the most commonly prioritised area for additional investment.
The focus on training suggests some organisations see the problem as extending beyond technology procurement. Where IT and OT teams follow different processes or lack a shared picture of incidents, the issue may lie as much in internal coordination and decision-making as in the monitoring tools themselves.
Supply chain risk is also emerging as a greater concern in OT security programmes following recent breaches, according to the study. That reflects the dependence of many industrial and public sector operators on external vendors, software providers and maintenance partners that connect into operational environments.
The research was conducted by Censuswide among cybersecurity decision-makers at organisations with between 250 and 10,000 employees. Respondents came from sectors including food manufacturing, automotive, aerospace, energy, utilities, telecoms, retail, pharmaceuticals, central government, local government and life sciences.
Across those sectors, the findings indicate that many organisations are still trying to bridge the divide between conventional IT security practices and the operational realities of industrial systems. With only a minority using OT-specific visibility tools and more than a quarter still relying on manual coordination between teams, the data points to persistent operational blind spots as cyber incidents continue to disrupt critical systems.
Business & Technology
Hammer Distribution signs UK firewall deal with Stormshield
JOSEPH GABRIEL LAGONSIN
News Editor
Hammer Distribution has signed a UK distribution partnership with Stormshield, becoming a distributor for the vendor’s next-generation firewall range.
The agreement gives Hammer access to Stormshield’s hardware and virtual firewall products, which are available immediately to its reseller and systems integrator network.
Stormshield is a European cybersecurity supplier whose network security products are aimed at organisations with strict security and data protection requirements. Its firewall range holds European and defence-related certifications including EU Restricted, NATO Restricted and ANSSI.
The deal adds another cybersecurity vendor to Hammer’s portfolio as distributors look to offer partners a broader mix of security products amid continued demand for network protection and data sovereignty. It also gives Stormshield wider access to UK channel partners through a distributor with an established base in storage, servers and security.
Channel focus
The partnership is intended to support resellers and systems integrators seeking an alternative to established US firewall suppliers. Hammer plans to provide technical pre-sales support, proof-of-concept assistance and training around the Stormshield range.
The products are designed for a wide range of environments, from small branch sites to larger operational technology settings. That positions the partnership to target customers across both IT and industrial infrastructure projects, where network segmentation and control remain core buying requirements.
Hammer has operated in the technology distribution market for more than 30 years. The company focuses on storage, server and security products, and works with vendors and channel partners on tailored deployments.
For Stormshield, the tie-up strengthens its route to market in the region through a specialist distributor with technical reach into the reseller channel. The French vendor sells to commercial organisations as well as government and defence customers that need protection for critical infrastructure, sensitive data and operational systems.
Dominic Ryles of Hammer Distribution described the agreement as part of a wider push to expand the company’s security offering for partners facing more complex customer requirements.
“We are incredibly proud to welcome Stormshield to the Hammer family,” said Dominic Ryles at Hammer Distribution. “In an era of evolving digital warfare, our partners need security solutions they can trust implicitly. Stormshield’s pedigree offers a level of assurance and European engineering excellence that is rare in the market. This partnership is not just about expanding our product line; it’s about providing our resellers with a competitive edge in the high-growth cybersecurity sector.”
Regional growth
The agreement is intended to help Stormshield expand through the channel by working with a distributor that can support partner recruitment and technical engagement. The company presented the deal as a route to broader market coverage for its firewall range.
“We are delighted to partner with Hammer Distribution,” said Bertrand Trastour, head of global sales at Stormshield. “Hammer’s reputation for deep technical expertise and their proactive approach to channel development makes them the perfect partner to accelerate Stormshield’s growth in the region. Together, we are committed to empowering the channel to solve the most complex security challenges facing businesses today.”
The announcement reflects a broader trend in the security market as European vendors sharpen their position around regional certification, sovereignty and transparency at a time when buyers are paying closer attention to where security products are developed and governed. For channel partners, that can create a clearer sales proposition in accounts where procurement teams want alternatives aligned with European standards and regulatory expectations.
Stormshield’s technologies are used by companies, government institutions and defence organisations seeking to secure critical infrastructure, sensitive data and operational environments.
Business & Technology
Oxford estate agent office opening attended by unicorn
AR Property Partners unveiled their Oxford office at The Old Police House, Old Botley, on May 1.
Twilight the unicorn was in attendance to help the team spread their unique brand of magic.
Guests at the opening enjoyed drinks, nibbles, and a cake made by Happy Cakes.
The firm also involved children from Botley, North Hinksey, and West Oxford Primary in creating a community garden.
The garden project was done in collaboration with Bunkers Hill Plant Nursery.
Botley Primary’s Eco Warriors came to the opening to see their garden and meet Twilight.
AR Property Partners offers a unique approach to sales, lettings, and mortgage services, with their new office set to aid the Oxford community.
Business & Technology
Cybersecurity has a speed problem
When Anthropic unveiled Claude Mythos in April, the reaction across the cybersecurity industry was immediate. Boards demanded answers, tech leaders called urgent meetings, and a familiar narrative began to take hold: AI is changing the rules of cybersecurity.
But while this is partly true, it misses the real point. AI hasn’t changed the rules. It has simply sped up the game and exposed that the rules were already broken.
For years, cybersecurity operated on a relatively stable assumption. If attackers discovered a vulnerability, it would take time to exploit it, and defenders would have a window to respond. That window was never perfect, but it made the system workable.
That time is now gone. In 2018, the average time between discovering a vulnerability and exploiting it was measured in years. Today, it is measured in hours, so this isn’t a gradual shift, it’s a fundamental change in how cyber risk behaves.
What tools like Mythos show is not a leap in technical capability, but a breakthrough in execution. Vulnerabilities that have existed for decades can now be found and exploited almost instantly. The bottleneck is no longer discovery. It is deciding what to fix and doing it fast enough.
So, this is where the real challenge begins.
On the defensive side, organisations are increasingly overwhelmed. AI systems can surface huge volumes of vulnerabilities, but they are far less effective at identifying which ones are actually exploitable. Security teams are left with growing backlogs, trying to prioritise risk while the cost of delay continues to rise.
Attackers, meanwhile, face a much simpler problem. They do not need to fix anything. They only need one viable path. AI gives them the ability to test multiple options and select the most effective route at machine speed.
This imbalance sits at the heart of the issue.
It is also being reinforced by a deeper structural problem. Many organisations still manage cybersecurity as if time is on their side. Annual penetration tests, slow patch cycles and retrospective reporting are all built on the assumption that vulnerabilities can be addressed before they are exploited.
That assumption no longer holds, especially as at the same time, the attack surface continues to expand. Every new integration, cloud service or legacy system creates another potential entry point. In many cases, the greatest risks do not come from well-tested core systems, but from overlooked suppliers or outdated components that no one wants to touch.
This is why the Mythos moment is about more than software flaws. It is about digital exposure. Most organisations do not fully understand what is exposed or how it could be exploited.
Therefore, the response cannot be to simply do more of the same, and this isn’t a problem that simply hiring more analyst can solve. The scale and speed of modern threats have already outgrown what humans can handle alone.
What is needed is a shift in approach, from reacting to incidents to continuously validating risk.
That shift depends on three things: visibility, validation and speed. Organisations need to understand what is exposed, prove what is actually exploitable, and act before attackers do.
But even that is not enough on its own.
We are now entering a phase where cybersecurity becomes an AI versus AI problem. Attackers are already using automated systems to scan, test and exploit vulnerabilities at scale. Defenders will have to respond in kind, using AI to continuously probe their own systems, simulate attacks and prioritise real risk.
The difference will come down to how effectively that technology is directed. AI can generate possibilities at scale. It can surface thousands of potential weaknesses. But it still lacks context. It cannot reliably decide what matters most, or what a real attacker would do next, and that responsibility still sits with humans.
Which means the real battleground in cybersecurity is shifting. It is no longer about who can find vulnerabilities first. It is about who can make better decisions, faster.
AI will continue to uncover weaknesses. That is inevitable. The question is who can turn that information into action before it is exploited.
Because cybersecurity is no longer just a technical challenge, it is a race, and right now, most organisations are running behind.
-
Crime & Safety2 weeks agoBicester man denies sexually assaulting two young girls
-
Oxford News3 weeks agoBanbury cake company with 400 year history shut down
-
Crime & Safety3 weeks agoBicester crash: Motorcyclist ‘seriously injured’ in hospital
-
UK News2 weeks agoTV tonight: Shetland meets CSI in a new drama about a disgraced cop | Television
-
UK News2 weeks agoStarmer says it ‘beggars belief’ he wasn’t told about Mandelson vetting failure as he faces Commons – UK politics live | Politics
-
Crime & Safety3 weeks agoLorry overturns on Oxfordshire A43 roundabout with driver trapped
-
UK News3 weeks agoFears over rogue parking by sunrise-chasers at national park after overnight ban
-
UK News3 weeks agoV&A faces calls to become living wage employer on eve of Stratford opening | V&A
