Sectrio

OT

why cybersecurity leaders should be worried about dead drops 1

Bleeding data: why cybersecurity leaders should be worried about dead drops

Wikipedia defines a dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals using a secret location. In cyberspace, however, a variant of this tradecraft has emerged in the last few years. This involves rogue insiders in organizations dumping valuable data including credentials, network information, or even ways […]

Bleeding data: why cybersecurity leaders should be worried about dead drops Read More »

The evolving cyber threat landscape in the Middle East and its implications for regional businesses 1

The evolving cyber threat landscape in the Middle East and its implications for regional businesses

As per Sectrio’s Threat Landscape Report for H1 2021, Cyber-attacks on Middle Eastern entities continued to rise this year with more cyberattacks logged from 5 known clusters outside the region targeting critical infrastructure, manufacturing, utilities, and oil and gas sectors. Most of these attacks were characterized by: An exponential increase in the degree of sophistication 

The evolving cyber threat landscape in the Middle East and its implications for regional businesses Read More »

how to secure and setrengthen water and wastewater treatment plants from cyberattacks

Strengthening implementation of America’s Water Infrastructure Act of 2018 to secure water and wastewater treatment plans

Problem statement: improving cybersecurity in water and wastewater treatment plants Solution: use a multi-phased approach targeting vulnerabilities and use of cybersecurity best practices to deter, detect and contain cyberattacks  The average water plant doesn’t have a cybersecurity expert on its rolls and that is just one part of the problem. Another part has to do

Strengthening implementation of America’s Water Infrastructure Act of 2018 to secure water and wastewater treatment plans Read More »

OT and IoT cybersecurity priorities for Indian businesses

OT and IoT cybersecurity priorities for Indian businesses

Understanding the OT and IoT threat environment As per the PwC’s 2022 Digital Trust Insights Survey, Indian businesses are investing more than ever in cybersecurity. This is indeed a welcome development and points to the rising awareness of the need to pay more attention to cybersecurity. However, in addition to improving the budgetary allocation, Indian

OT and IoT cybersecurity priorities for Indian businesses Read More »

Lowering of Geopolitical event threshold and its implications

Lowering of geopolitical event threshold and its implications for OT, IoT, and critical infrastructure cybersecurity

[et_pb_section admin_label=”section”] [et_pb_row admin_label=”row”] [et_pb_column type=”4_4″][et_pb_text admin_label=”Text”] In the last decade, some of the biggest cyberattacks had some form of a geopolitical link. Right from the Ukrainian power grid attack, the attack on the Florida water treatment plant to the Colonial Pipeline cyberattack, every major cyberattack has been perpetrated by state-backed hackers using malware and breach tactics developed

Lowering of geopolitical event threshold and its implications for OT, IoT, and critical infrastructure cybersecurity Read More »

wws defense in depth

Securing water and wastewater treatment plants with defense-in-depth

In April this year, the intelligence community in the US issued a warning that adversarial entities were planning to target the country using cyberspace. States were wielding cyber operations as a means to achieve nefarious goals including causing destruction and disruption. Just 5 months down, we are already seeing a significant rise in the rate

Securing water and wastewater treatment plants with defense-in-depth Read More »

Cybersecurity is the need of the hour banner

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour

Sectrio showcased its OT and IoT security solutions and threat intelligence offerings at the event. Through meetings and discussions with cybersecurity leaders, we were able to get a pulse on cybersecurity priorities in the region. As GITEX 2021, the most coveted and attended tech event in the Middle East region got over last week. We

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour Read More »

2 1

India Vs. Pakistan: cricket encounters on the field and digital battles off it

Highest amount of Cyberattacks recorded in India While yesterday was a big day for cricket fans in the Indian sub-continent. Cricket teams from India and Pakistan clashed in a T-20 encounter as part of the ICC Men’s T20 World Cup in Dubai. While the match was being held, we were able to record some interesting developments in cyberspace.   

India Vs. Pakistan: cricket encounters on the field and digital battles off it Read More »

5 1

Singapore brings focus to its national OT cybersecurity strategy

Almost half a decade after it unveiled its cybersecurity strategy, Singapore brought in new amendments to its national plan to move towards a more proactive approach to address threats. It also brought in a new operational technology competency framework to provide a strong foundation for attracting and developing talent for the emerging OT sector in

Singapore brings focus to its national OT cybersecurity strategy Read More »

Scroll to Top