Insights

Security industry opinion and insight

Thumbnail image for The State of OT Cyber Maturity: Progress but Gaps Persist
Cybersecurity

The State of OT Cyber Maturity: Progress but Gaps Persist

Industry reports and audits continue to paint a similar picture of increasing OT cybersecurity maturity among large, regulated asset owners, but with further room for improvement. The following is a summary of FERC's 'Lessons Learned Audit Report' regarding the implementation of NERC CIP in the US energy sector, SANS 'State of ICS/OT Security Survey' (2025), and Fortinet's 'State of Operational Technology and Cybersecurity Report' (2025)

Thumbnail image for From Threat to Control: Preparing OT for the Quantum Transition
Cybersecurity

From Threat to Control: Preparing OT for the Quantum Transition

In our previous article, 'The Quantum Threat to Operational Technology: Trust Now, Forge Later', we explored how (TNFL) and Harvest Now, Decrypt Later (HNDL) reshape the risk landscape for Operational Technology (OT), and how these quantum-era threats cascade through the Purdue model. This follow-up introduces the 21x12 framework mapping risks to controls.

Thumbnail image for WA MarketView: Mitsubishi Electric's acquisition of Nozomi Networks
Cybersecurity

WA MarketView: Mitsubishi Electric's acquisition of Nozomi Networks

On September 9, 2025, Mitsubishi Electric Corporation (Mitsubishi Electric) and Nozomi Networks (Nozomi) publicly announced that Mitsubishi Electric will acquire the remaining shares of Nozomi in a deal valued at approximately $883 million in cash and equity, resulting in the largest OT cybersecurity acquisition to date. The deal is expected to be completed in Q4 2025 following regulatory approval. Two questions we’re being asked are: what is in it for both parties? And how might the acquisition play out?

Thumbnail image for Industrial OT Cybersecurity Platforms: Enabling Interoperability, Enforcement and Resilience
Cybersecurity

Industrial OT Cybersecurity Platforms: Enabling Interoperability, Enforcement and Resilience

In a May 2025 insight, ‘Industrial Cybersecurity Consulting and Managed Services Navigator 2025: Building Operational Resilience’, Westlands Advisory highlighted how digitalisation, regulatory pressure, and expanding attack surfaces are reshaping security priorities for operational technology (OT) environments. The industrial cybersecurity market is moving toward integrated, enforceable, and service-ready platforms.

Thumbnail image for Cyber Risk & Governance: Should Public Company Reporting Be More Transparent?
Cybersecurity

Cyber Risk & Governance: Should Public Company Reporting Be More Transparent?

Given the growing cyber risk and number of significant incidents, have public companies made a proportionate investment in cyber governance and resilience? Whilst growing cybersecurity vendor revenues point to improving cybersecurity maturity, a further source of insight can be derived from how public companies report on cyber risks and threats. Westlands Advisory recently conducted a comparative analysis of cybersecurity terminology in the annual reporting of the Dow Jones Core 30 and Euronext Core 30 companies.

Thumbnail image for Quantum-Safe Architecture: The Path to Cryptographic Resilience Starts with Discovery and Classification
Cybersecurity

Quantum-Safe Architecture: The Path to Cryptographic Resilience Starts with Discovery and Classification

The advent of quantum computing presents one of the most profound shifts in cybersecurity since the invention of public-key cryptography. As quantum technology rapidly develops, it poses a direct threat to the classical encryption algorithms that underpin the global financial system, digital identities, secure communications, and data privacy. To prepare for a Quantum-Safe future, government agencies and critical infrastructure operators should start with cryptographic discovery and classification.

Chat to us

*All fields required