Government ❯ Cybersecurity Policy ❯ Critical Infrastructure Protection ❯ Risk Management
The decoy water-plant system let researchers document TwoNet’s OT tactics, yielding concrete defense guidance.