decision tree: industrial cybersecurity solution

[Infographics decision tree] Do you need an industrial cybersecurity solution?

The industrial sector and its players heavily rely on interconnected IT systems. We often assume that, because industrial networks are connected only to an industrial internet, vulnerabilities are few and far between…. Wrong! Industrial systems are more exposed to cyber threats than what it may seem and the consequences may be huge. Investing in a […]

Palo Alto Networks and Sentryo Secure the Industrial Internet

As industrial corporations are migrating towards Industry 4.0 technologies, their production infrastructures are increasingly exposed to cyber threats. Whether it’s a production line, a power station, an oil platform or a water, gas or electricity distribution network, automation systems are connected to IP networks. Contractors have remote accesses. Windows computers are widely used to run […]

poisoning of tap water

The Sentryo Files
Season 2 – Episode 7: Poisoning of tap water in the US

The Sentryo Files examine a past cyberattack aimed at poisoning tap water in the US state of Georgia. Residents left without tap water after an attack on a water treatment plant In 2013, someone broke into the precinct of the water treatment plant and managed to change chemical levels used to treat the water. Around […]

brute force attack

How to protect yourself from a brute force attack?

We often read in the Sentryo magazine… Industry 4.0 is full of promises but also represents security threats for industrial networks! Of these threats, the most long-standing and persistent attack is, without a doubt, the brute force attack. How can you effectively protect yourself against this type of cyberattack? We analyze the vulnerabilities and the […]

Havex Malware energy sector

The Sentryo Files
Season 2 – Episode 6: Havex malware vs. the energy sector

In a previous episode of The Sentryo Files, we talked about a cyberattack on a Soviet oil pipeline at the end of the Cold War… Today find out about the massive espionage campaign waged on companies in the energy sector by the Havex malware in 2013 and 2014. Over 1000 companies in the energy sector […]

BlackPOS credit card

The Sentryo Files
Season 2 – Episode 5: BlackPOS and the massive financial data breach

After the attack on the Soviet pipeline and the contamination of drinking water… Season 2 of The Sentryo Files continues to explore the realm of cyberattacks with the massive attack waged on a major American retailer, Target. 40 million PIN numbers were stolen through unprotected remote access Between November and December 2013, Target’s POS terminals […]

connected industrial robots

Industry 4.0: Industrial robots vs. Cyberattacks

Industry 4.0 represents a major cybersecurity challenge for companies. In a study conducted by Trend Micro and the Polytechnic University of Milan, a team of researchers and students in the field of cybersecurity successfully demonstrated the vulnerability of industrial robots. This weakness is coupled with the era of artificial intelligence and the IIoT! The security […]

Triton maware

Analysis of Triton industrial malware

In this article the Sentryo Security team presents you with an analysis of a malware specially designed to cripple the security of industrial systems. Read on for an in-depth look at how the Triton industrial malware works and the measures to implement to ensure protection. Triton industrial malware: operational summary The Triton malware, also called […]