The Colonial Pipeline attack is a clear example of how ransomware can shut down components of the critical national infrastructure. IT-driven compromises can shut down OT environments, and all organizations must be prepared for attack.
The Analyst Team
Senior Analyst, IoT Cybersecurity
Hollie provides insight into the fascinating and fast-moving domain of IoT cybersecurity.
Hollie has a range of experience in research. She began her career in the legal sector, writing and researching for expert witness reports on the labor market. She then moved into product testing, with a consumer protection focus. In this role, she was responsible for managing comparative tests of various technology products, as well as regular testing and investigative work into the security of these products.
She has published articles in Which?, one of the UK’s largest subscription magazines, produced by the country’s largest consumer organization; and Computing magazine.
This Analyst Opinion is included in:
Our expert analysts will review your question and the Ask an Analyst team will get back to you. We aim to respond within 24 hours, but we’re often quicker.
Ask an Analyst
Our team of experts are here to answer your questions. From advice on market trends to a query on research point, and everything in between, we want to hear from you.
Ask an analyst is available as part of a subscription. If you'd like access, contact us today.