Cybersecurity awareness month

Why-cyberspace-remains-largely-unaffected-amidst-ongoing-geopolitical-turmoil

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

The lack of any large cyber incidents doesn’t mean things are still deep under. Instead, this could well be the lull before a cyberstorm.     Earlier this week, Iran-linked APT group Charming Kitten (aka Ballistic Bobcat APT, APT35, and Phosphorus) initiated a fresh cyber espionage campaign targeting 14 countries across the globe. The objective of these […]

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil Read More »

Complete-Guide-to-Asset-Inventory-Management-in-OTICS-1

Complete Guide to Asset Inventory Management in OT/ICS

In the past few years, it has been seen that industrial control systems (ICSs) are also vulnerable to cybersecurity incidents. As a result, organizations have become increasingly aware of their vulnerabilities, which has led to the deployment of security measures to boost the cybersecurity of their networks and devices. However, a persistent issue remains –

Complete Guide to Asset Inventory Management in OT/ICS Read More »

OT/ICS VAPT practical guide

OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide

Have you ever wondered about the hidden chinks in the armor of your operational technology systems? In the interconnected web of technology, where the digital landscape extends its reach into every corner of our lives, safeguarding data and systems has never been more crucial. This is especially true regarding Operational Technology (OT), the silent sentinel

OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide Read More »

NIST 800-82 R2/R3

NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

“Is our critical infrastructure truly secure in the face of ever-evolving cyber risks and insider threats?” This question resonates with an urgency that cannot be disregarded in a world where technology is woven into every facet of our existence. The pulse of modern industries relies on the seamless convergence of Operational Technology (OT) and digital

NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals Read More »

wws defense in depth

Securing water and wastewater treatment plants with defense-in-depth

In April this year, the intelligence community in the US issued a warning that adversarial entities were planning to target the country using cyberspace. States were wielding cyber operations as a means to achieve nefarious goals including causing destruction and disruption. Just 5 months down, we are already seeing a significant rise in the rate

Securing water and wastewater treatment plants with defense-in-depth Read More »

Cybersecurity is the need of the hour banner

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour

Sectrio showcased its OT and IoT security solutions and threat intelligence offerings at the event. Through meetings and discussions with cybersecurity leaders, we were able to get a pulse on cybersecurity priorities in the region. As GITEX 2021, the most coveted and attended tech event in the Middle East region got over last week. We

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour Read More »

2 1

India Vs. Pakistan: cricket encounters on the field and digital battles off it

Highest amount of Cyberattacks recorded in India While yesterday was a big day for cricket fans in the Indian sub-continent. Cricket teams from India and Pakistan clashed in a T-20 encounter as part of the ICC Men’s T20 World Cup in Dubai. While the match was being held, we were able to record some interesting developments in cyberspace.   

India Vs. Pakistan: cricket encounters on the field and digital battles off it Read More »

5 1

Singapore brings focus to its national OT cybersecurity strategy

Almost half a decade after it unveiled its cybersecurity strategy, Singapore brought in new amendments to its national plan to move towards a more proactive approach to address threats. It also brought in a new operational technology competency framework to provide a strong foundation for attracting and developing talent for the emerging OT sector in

Singapore brings focus to its national OT cybersecurity strategy Read More »

WWS webinar nov

Addressing challenges in securing water and wastewater treatment facilities

According to the findings of the latest Sectrio Threat Landscape Report, water, and wastewater treatment facilities are among the most attacked sub-segments within critical infrastructure globally. Attacks on these facilities grew 156 percent in H1 2021 underscoring the need to improve security and deploy more robust measures to prevent breaches and attacks from succeeding. Earlier

Addressing challenges in securing water and wastewater treatment facilities Read More »

Untitled design 15

Cyber securing connected OT and IoT infrastructure in the Middle East

In the last 15 days, hackers in the Middle East and Africa region have added another sector to the list of their targets in the region. Cyberattacks on healthcare facilities in the region rose significantly over baseline levels during this period. Let us examine the causes and implications of this trend. Since 2019, we have

Cyber securing connected OT and IoT infrastructure in the Middle East Read More »

Scroll to Top