Sectrio

Our Videos

Our Videos

Featured

Sandeep Naganur - IoT Security Trends in 2019

Sectrio Hub is the focal point for the Edgetech Appliance(s) and Remote Collectors and presents the user interface for Sectrio’s offerings. It connects to the Sectrio Update Center to gather the latest threat intelligence updates.

Suggested Videos

Secure the City, Connected Drives Risk – Ideal Solutions and Strategies to Prepare‍‍‍
Watch a brief video about Sectrio and learn how our solutions can help your organization improve your institutional cybersecurity posture
Strategies and solutions to secure OT, IoT and converged manufacturing environments in the era of Covid-19 themed attacks

Category

Latest attacks on iot critical infrastructure exploits trends across the north american market
Global Risks Report | IoT/OT Cyberattacks Impact on the Market and What Should Be Done to Prepare?
The Future of IoT, IT and OT Security & Current Trends in Cybersecurity
The Overview of Critical Infrastructure Act
CMMC Compliance Assessment: Outline and Updates
How CMMC Journey Can Help ICS Security Journey
CMMC Compliance and assessment: Cyber Hygiene Steps for Security Plan of Action
CMMC Compliance Assessment: Adoption Challenges
CMMC Compliance Assessment: Current and Target Maturity Models
Avail Sectrio’s FREE Services to Meet EPA Guidelines
Why don’t IT security tools cover your converged networks?
Typical Water Utility Network Deployment
EPA Cybersecurity Checklist for Water Utilities
Converged IoT, IT, and OT cybersecurity Solution Approaches for Water Utilities
Benefits of a Cybersecurity Program for Water Utilities
The Overview of Real-Time Honeypot Infrastructure
About Sectrio – A Division of Subex
The Overview of Cyber Threats on Water Facilities
How does cybersecurity regulatory compliance help?
Takeaways from the Global Threat Landscape Assessment Report 2022
How are the Ukraine and Russia Conflicts Changing the Cyberspace
Percentage Detection of Various Types of Data in Dead Drops
What did hackers learn from the Colonial pipeline episode?
Types of Cyberattacks and Examples
Percentage Detection of Various Types of Data in Dead Drops
Types of Cyberattacks and Examples
Crowdsourcing a Cyberattack
The Rise of Cyberattacks on Supply Chain
Key Advanced Persistent Threat (APT) Clusters Under Observation
Social Engineering in Cybersecurity – Evolution of Social Engineering Attacks
Cyberattacks Statistics 2021 – Most attacked cities & Sources of Malware
Top 5 Reasons Behind the Rise in Cyberattacks
Rising Cyberattacks on Key Sectors and Trends
Global Honeypot Published Locations – OT & IoT Cyberattacks
Trends and Challenges in the Manufacturing Profile
OT Cybersecurity Adoption Challenges in the Manufacturing Profile
Is It Possible to Integrate OT Monitoring with Current IT SOC Monitoring Solution
Improving Risk and Governance Profile for Compliance in the Manufacturing Industry
How to Scan The OT Devices Identified and Related Vulnerabilities
How to Prevent Zero Day Attacks
How to Implement Zero Trust Architecture in OT Environment
Gap Analysis Current and Target Profile in the Manufacturing Industry
NIST Cybersecurity Framework in the Manufacturing Profile
Current Industrial Threat Landscape in the Manufacturing Profile
OT & IIoT Security Roadmap With an Example
How to Secure Legacy Infrastructure Legacy Devices support the use of long known exploits
How Sectrio Solutions & Services Helped Our Customers to Secure from Cyberattacks
Customer Success Stories OT & IoT Threat Monitoring for Oil & Gas Plant
Customer Success Stories Micro-segmentation for IoT & OT Networks
Weak Protection of OT from IT – Lack Of Network Segregation
Customer Success Stories Medical IoT Device Visibility, Risk Assessment & Monitoring

Customer Success Stories Maritime Security for Shipping Companies

Customer Success Stories Industrial Smart City – Safe City
Common Password Vulnerabilities Weak, Guessable, and Hardcoded Passwords
About Sectrio OT, IoT, IT, and 5G Cybersecurity Solutions Provider
Key Advanced Persistent Threat APT Detection & Solutions
Cybersecurity Standards Compliance Impacting the Industry
October 2021, Cybersecurity Month Key Highlights
Sophistication in Cyberattacks Across Industries
How to address cybersecurity challenges that plague the water and wastewater utility sector
Watch a brief video about Sectrio and learn how our solutions can help your organization improve your institutional cybersecurity posture
Secure the City, Connected Drives Risk – Ideal Solutions and Strategies to Prepare‍‍‍
Strategies and solutions to secure OT, IoT and converged manufacturing environments in the era of Covid-19 themed attacks
Sandeep Naganur, Head of Strategic Partnerships, Subex speaks on IoT security trends to watch out for in 2019
Prayukth K V, Head of IoT Marketing, Subex articulates the link between IoT security and sustainable development
Vinod Kumar, CEO and MD, Subex, speaks about the new Subex IoT Lab and the company’s roadmap for IoT and analytics
Latest attacks on iot critical infrastructure exploits trends across the north american market
Global Risks Report | IoT/OT Cyberattacks Impact on the Market and What Should Be Done to Prepare?
The Future of IoT, IT and OT Security & Current Trends in Cybersecurity
The Overview of Critical Infrastructure Act
CMMC Compliance Assessment: Outline and Updates
How CMMC Journey Can Help ICS Security Journey
CMMC Compliance and assessment: Cyber Hygiene Steps for Security Plan of Action
CMMC Compliance Assessment: Adoption Challenges
CMMC Compliance Assessment: Current and Target Maturity Models
Avail Sectrio’s FREE Services to Meet EPA Guidelines
Why don’t IT security tools cover your converged networks?
Typical Water Utility Network Deployment
EPA Cybersecurity Checklist for Water Utilities
Converged IoT, IT, and OT cybersecurity Solution Approaches for Water Utilities
Benefits of a Cybersecurity Program for Water Utilities
The Overview of Real-Time Honeypot Infrastructure
About Sectrio – A Division of Subex
The Overview of Cyber Threats on Water Facilities
How does cybersecurity regulatory compliance help?
Takeaways from the Global Threat Landscape Assessment Report 2022
How are the Ukraine and Russia Conflicts Changing the Cyberspace
Percentage Detection of Various Types of Data in Dead Drops
What did hackers learn from the Colonial pipeline episode?
Types of Cyberattacks and Examples
Percentage Detection of Various Types of Data in Dead Drops
Types of Cyberattacks and Examples
Crowdsourcing a Cyberattack
The Rise of Cyberattacks on Supply Chain
Key Advanced Persistent Threat (APT) Clusters Under Observation
Social Engineering in Cybersecurity – Evolution of Social Engineering Attacks
Cyberattacks Statistics 2021 – Most attacked cities & Sources of Malware
Top 5 Reasons Behind the Rise in Cyberattacks
Rising Cyberattacks on Key Sectors and Trends
Global Honeypot Published Locations – OT & IoT Cyberattacks
Trends and Challenges in the Manufacturing Profile
OT Cybersecurity Adoption Challenges in the Manufacturing Profile
Is It Possible to Integrate OT Monitoring with Current IT SOC Monitoring Solution
Improving Risk and Governance Profile for Compliance in the Manufacturing Industry
How to Scan The OT Devices Identified and Related Vulnerabilities
How to Prevent Zero Day Attacks
How to Implement Zero Trust Architecture in OT Environment
Gap Analysis Current and Target Profile in the Manufacturing Industry
NIST Cybersecurity Framework in the Manufacturing Profile
Current Industrial Threat Landscape in the Manufacturing Profile
OT & IIoT Security Roadmap With an Example
How to Secure Legacy Infrastructure Legacy Devices support the use of long known exploits
How Sectrio Solutions & Services Helped Our Customers to Secure from Cyberattacks
Customer Success Stories OT & IoT Threat Monitoring for Oil & Gas Plant
Customer Success Stories Micro-segmentation for IoT & OT Networks
Weak Protection of OT from IT – Lack Of Network Segregation
Customer Success Stories Medical IoT Device Visibility, Risk Assessment & Monitoring

Customer Success Stories Maritime Security for Shipping Companies

Customer Success Stories Industrial Smart City – Safe City
Common Password Vulnerabilities Weak, Guessable, and Hardcoded Passwords
About Sectrio OT, IoT, IT, and 5G Cybersecurity Solutions Provider
Key Advanced Persistent Threat APT Detection & Solutions
Cybersecurity Standards Compliance Impacting the Industry
October 2021, Cybersecurity Month Key Highlights
Sophistication in Cyberattacks Across Industries
Cybersecurity Standards Compliance Impacting the Industry
Scroll to Top