{"version":"1.0","provider_name":"Control Engineering","provider_url":"https:\/\/www.controleng.com","author_name":"Control Engineering Staff","author_url":"https:\/\/www.controleng.com\/author\/control-engineering-staff\/","title":"Core architecture strategies for IT\/OT network integration - Control Engineering","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6YmzWI6vDN\"><a href=\"https:\/\/www.controleng.com\/core-architecture-strategies-for-it-ot-network-integration\/\">Core architecture strategies for IT\/OT network integration<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.controleng.com\/core-architecture-strategies-for-it-ot-network-integration\/embed\/#?secret=6YmzWI6vDN\" width=\"600\" height=\"338\" title=\"&#8220;Core architecture strategies for IT\/OT network integration&#8221; &#8212; Control Engineering\" data-secret=\"6YmzWI6vDN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/GSIR2411_F_ETechGroup-Figure1.png","thumbnail_width":2293,"thumbnail_height":1618,"description":"Cybersecurity insights Operational technology (OT) networks prioritize system availability and safety, requiring distinct protocols, cybersecurity standards and infrastructure to protect industrial operations from evolving cyber threats. Implementing dual firewalls, access control, micro-segmentation, and threat detection enhances OT security, protecting critical industrial processes from cyberattacks. Micro-segmentation isolates OT devices into functional zones, minimizing potential cyberattack impacts [&hellip;]"}