Jennifer Tullman-Botzer

Director of Content Marketing, Cyolo

Jennifer Tullman-Botzer has over a decade of experience in cybersecurity marketing and is as tired as you are of hackers-in-hoodies stock images. She joined Cyolo in 2021 and currently serves as director of content marketing.

Contributed Posts (65)
Blog

“Just Migrate to the Cloud” and Other Bad OT Security Advice

Too many Secure Remote Access tools for OT demand infrastructure overhauls as a starting point. But these solutions shouldn’t ask you to change – they should adapt to you.

Read More
Blog

How Secure Remote Access Became an Unexpected Growth Engine

New research reveals Secure Remote Access is driving productivity, agility, and growth in manufacturing. Discover why SRA is a business enabler, not just a cybersecurity tool.

Read More
Blog

The Double-Edged Sword of Third-Party Vendors in Manufacturing

Learn how to stay productive and protected when granting potentially risky OT systems access to third-party vendors and OEMs.

Read More
Blog

Cyber-Physical Systems: What They Are and How to Protect Them

Cyber-physical systems are increasingly under attack by cybercriminals. Learn how to stay both productive and protected.

Read More
Blog

The Relationship Between Safety, Availability, and Security in Critical Industries

Read More
Blog

Why OT Security Must Include Non-Human Identities (NHIs)

Read More
Blog

How to Overcome the Limitations of Legacy Secure Remote Access (SRA)

Read More
Blog

7 Shortcomings of Legacy Secure Remote Access (SRA)

Learn why legacy Secure Remote Access tools like VPNs, VDI, and jump servers do not meet the security or operational needs of the modern OT environment.

Read More
Blog

Does Secure Access Service Edge (SASE) Meet OT Security Needs?

Read More
Blog

5 “Unique” Security Challenges Facing OT/ICS Environments

Read More
Page 3 of 7