Jennifer Tullman-Botzer

Head of Content, Cyolo

Jennifer Tullman-Botzer has over a decade of experience in cybersecurity marketing and is as tired as you are of hackers-in-hoodies stock images. She joined Cyolo in 2021 and currently serves as Head of Content. Prior to Cyolo, Jennifer worked in a variety of marketing roles at IBM Security. She lives in Tel Aviv, Israel.

Contributed Posts (60)
Blog

Debunking the OT Security Myth: More Control Won’t Slow You Down

Strong security doesn't have to slow down operations down. Learn how frictionless access control helps OT teams stay safe, fast, and fully in control.

Read More
Blog

“Just Migrate to the Cloud” and Other Bad OT Security Advice

Too many Secure Remote Access tools for OT demand infrastructure overhauls as a starting point. But these solutions shouldn’t ask you to change – they should adapt to you.

Read More
Blog

How Secure Remote Access Became an Unexpected Growth Engine

New research reveals Secure Remote Access is driving productivity, agility, and growth in manufacturing. Discover why SRA is a business enabler, not just a cybersecurity tool.

Read More
Blog

The Double-Edged Sword of Third-Party Vendors in Manufacturing

Learn how to stay productive and protected when granting potentially risky OT systems access to third-party vendors and OEMs.

Read More
Blog

Cyber-Physical Systems: What They Are and How to Protect Them

Cyber-physical systems are increasingly under attack by cybercriminals. Learn how to stay both productive and protected.

Read More
Blog

Why Third-Party Access to OT Environments Requires Added Security Controls

Industrial enterprises today rely heavily on third-party vendors, contractors, and OEMs. Learn how to ensure these potentially risky users are accessing critical systems in a way that's both safe and secure.

Read More
Blog

The Relationship Between Safety, Availability, and Security in Critical Industries

Read More
Blog

Why OT Security Must Include Non-Human Identities (NHIs)

Read More
Blog

Why the IT Security Toolkit Does Not Work for OT

Read More
Blog

How to Overcome the Limitations of Legacy Secure Remote Access (SRA)

Read More
Page 2 of 6