Sectrio

Utilities

OT/ICS Security in the Power Sector

Complete Guide to OT/ICS Security in the Power Sector

Electricity, a resource often taken for granted, is the lifeblood of our modern world, powering our daily lives, industries, and economies. But the systems that generate, transmit, and distribute this essential resource are complex and interconnected, leaving them vulnerable to various threats. From natural disasters to cyberattacks, ensuring the power grid’s reliability, safety, and security […]

Complete Guide to OT/ICS Security in the Power Sector Read More »

Looking-ahead-of-CEA-guidelines-to-secure-the-power-sector-in-India

Looking ahead of CEA guidelines to secure the power sector in India

India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured steps to improve their overall cybersecurity posture and protect critical infrastructure from cyber attacks through specific interventions. The guidelines cover a wide gamut

Looking ahead of CEA guidelines to secure the power sector in India Read More »

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids

A recent report prepared by the U.S. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response and the Office of Energy Efficiency and Renewable Energy highlights the cybersecurity considerations to be taken into account for distributed energy resources (DER), such as solar, storage, and other clean energy technologies. The report also outlines the

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids Read More »

why cybersecurity leaders should be worried about dead drops 1

Bleeding data: why cybersecurity leaders should be worried about dead drops

Wikipedia defines a dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals using a secret location. In cyberspace, however, a variant of this tradecraft has emerged in the last few years. This involves rogue insiders in organizations dumping valuable data including credentials, network information, or even ways

Bleeding data: why cybersecurity leaders should be worried about dead drops Read More »

The evolving cyber threat landscape in the Middle East and its implications for regional businesses 1

The evolving cyber threat landscape in the Middle East and its implications for regional businesses

As per Sectrio’s Threat Landscape Report for H1 2021, Cyber-attacks on Middle Eastern entities continued to rise this year with more cyberattacks logged from 5 known clusters outside the region targeting critical infrastructure, manufacturing, utilities, and oil and gas sectors. Most of these attacks were characterized by: An exponential increase in the degree of sophistication 

The evolving cyber threat landscape in the Middle East and its implications for regional businesses Read More »

how to secure and setrengthen water and wastewater treatment plants from cyberattacks

Strengthening implementation of America’s Water Infrastructure Act of 2018 to secure water and wastewater treatment plans

Problem statement: improving cybersecurity in water and wastewater treatment plants Solution: use a multi-phased approach targeting vulnerabilities and use of cybersecurity best practices to deter, detect and contain cyberattacks  The average water plant doesn’t have a cybersecurity expert on its rolls and that is just one part of the problem. Another part has to do

Strengthening implementation of America’s Water Infrastructure Act of 2018 to secure water and wastewater treatment plans Read More »

wws defense in depth

Securing water and wastewater treatment plants with defense-in-depth

In April this year, the intelligence community in the US issued a warning that adversarial entities were planning to target the country using cyberspace. States were wielding cyber operations as a means to achieve nefarious goals including causing destruction and disruption. Just 5 months down, we are already seeing a significant rise in the rate

Securing water and wastewater treatment plants with defense-in-depth Read More »

Cybersecurity is the need of the hour banner

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour

Sectrio showcased its OT and IoT security solutions and threat intelligence offerings at the event. Through meetings and discussions with cybersecurity leaders, we were able to get a pulse on cybersecurity priorities in the region. As GITEX 2021, the most coveted and attended tech event in the Middle East region got over last week. We

GITEX 2021 key takeaway: OT and IoT cybersecurity is the need of the hour Read More »

2 1

India Vs. Pakistan: cricket encounters on the field and digital battles off it

Highest amount of Cyberattacks recorded in India While yesterday was a big day for cricket fans in the Indian sub-continent. Cricket teams from India and Pakistan clashed in a T-20 encounter as part of the ICC Men’s T20 World Cup in Dubai. While the match was being held, we were able to record some interesting developments in cyberspace.   

India Vs. Pakistan: cricket encounters on the field and digital battles off it Read More »

Scroll to Top