February 23, 2026
Securing the Energy Supply Chain for AI
Artificial intelligence has become a core driver of U.S. innovation, and is increasingly treated as part of the nation’s critical infrastructure. Its impact spans economic growth and productivity, national security…
January 15, 2026
From AI Guidance to Enforceable Controls: How to Operationalize CISA’s AI-in-OT Principles
Amit Pawar, SVP, Solutions Advisory & Customer Success, Xage Security Artificial intelligence is no longer a future concept in operational technology (OT). Across critical infrastructure, AI is rapidly moving from…
December 12, 2025
Protection of Critical Infrastructure: Adopting Zero Trust and Strategic Resilience for Modern Threats
Authors: Rangappa Halagani, Senior Director, OT/IoT Cybersecurity, LTIMindtree and Amit Pawar, SVP, Solutions Advisory & Customer Success, Xage Security Safeguarding critical infrastructure has emerged as a paramount concern in the current…
November 5, 2025
Highlights from NVIDIA GTC
Author: Vivek Doshi, Director of Product Management, Xage Security We had an incredible time at 2025 NVIDIA GTC in Washington, D.C., exploring what’s next on the AI frontier — from…
September 24, 2025
How to Contain a Crisis: Jaguar Land Rover’s Cyberattack Response Highlights the Need for Zero Trust in Manufacturing
Author: Sri Sundaralingam, Chief Marketing Officer, Xage Security The automotive industry blends cutting-edge digital systems with complex, globally distributed production. That IT–OT (Operational Technology) convergence has unlocked vast efficiencies—but it’s…
July 1, 2025
Strengthening Cybersecurity for Co-op and Municipal Utilities under New NERC CIP Mandates
Author: Amit Pawar, VP of Consulting and Services, Xage Security Cooperative and municipal utilities across North America face a dual challenge: evolving cybersecurity threats and increasing compliance obligations. Recent updates…
April 23, 2025
AI-Driven Adaptive Access for a Dynamic Threat Landscape
Author: Vivek Doshi, Director of Product Management, Xage Security The Problem with Static Security Policies Conventional access control systems apply the same rules to every login, every time. This inflexible…