Jennifer Tullman-Botzer

Head of Content, Cyolo

Jennifer Tullman-Botzer has over a decade of experience in cybersecurity marketing and is as tired as you are of hackers-in-hoodies stock images. She joined Cyolo in 2021 and currently serves as Head of Content. Prior to Cyolo, Jennifer worked in a variety of marketing roles at IBM Security. She lives in Tel Aviv, Israel.

Contributed Posts (63)
Blog

“Just Migrate to the Cloud” and Other Bad OT Security Advice

Too many Secure Remote Access tools for OT demand infrastructure overhauls as a starting point. But these solutions shouldn’t ask you to change – they should adapt to you.

Read More
Blog

How Secure Remote Access Became an Unexpected Growth Engine

New research reveals Secure Remote Access is driving productivity, agility, and growth in manufacturing. Discover why SRA is a business enabler, not just a cybersecurity tool.

Read More
Blog

The Double-Edged Sword of Third-Party Vendors in Manufacturing

Learn how to stay productive and protected when granting potentially risky OT systems access to third-party vendors and OEMs.

Read More
Blog

Cyber-Physical Systems: What They Are and How to Protect Them

Cyber-physical systems are increasingly under attack by cybercriminals. Learn how to stay both productive and protected.

Read More
Blog

Why Third-Party Access to OT Environments Requires Added Security Controls

Industrial enterprises today rely heavily on third-party vendors, contractors, and OEMs. Learn how to ensure these potentially risky users are accessing critical systems in a way that's both safe and secure.

Read More
Blog

The Relationship Between Safety, Availability, and Security in Critical Industries

Read More
Blog

Why OT Security Must Include Non-Human Identities (NHIs)

Read More
Blog

Why the IT Security Toolkit Does Not Work for OT

Read More
Blog

How to Overcome the Limitations of Legacy Secure Remote Access (SRA)

Read More
Blog

7 Shortcomings of Legacy Secure Remote Access (SRA)

Learn why legacy Secure Remote Access tools like VPNs, VDI, and jump servers do not meet the security or operational needs of the modern OT environment.

Read More
Page 2 of 7