OT & IIoT Security Mag 

Sentryo’s Security Lab reveals the vulnerabilities of an industrial ethernet switch

November 9th, 2017|Categories: Detection|

The Sentryo Security Lab carried out a security analysis on a client’s MOXA EDS-G512E industrial ethernet switch, interconnected to Sentryo’s ICS CyberVision solution. For two whole days, the Security Lab put the industrial ethernet [...]

The complete, in-depth analysis of the cyberattacks on the Ukrainian power grid in an ebook

November 2nd, 2017|Categories: Use cases|

As we like to reiterate here at Sentryo, industrial digitalization, despite the significant advantages, brings with it vulnerabilities to new forms of cyberattacks. Since 2008, we’ve seen how critical industrial infrastructures have been targeted [...]

📁 The Sentryo Files: Industries vs. Cyberattacks
Episode 6: Cyberattack on Aramco oil company

October 12th, 2017|Categories: Use cases|

In previous episodes of the Sentryo Files, we uncovered the details of some of the most emblematic attacks that have hit the industrial sector: connected car, water treatment plant, etc. This article takes a [...]

6 flaws that expose the maritime sector to cyberattacks

October 5th, 2017|Categories: ICS & Cybersecurity|

The maritime sector is particularly vulnerable to threats from cyberattacks on its operational technology (OT), largely because of the recent profound digital transformation it has undergone. However, exactly how vulnerable is this sector? Let’s [...]

Cybersecurity of ESPs: What obligations are imposed by the French Military Programming Law?

September 28th, 2017|Categories: ICS & Cybersecurity|

A surge in state cyberthreats amidst a tense geopolitical context - this is the backdrop against which many economic and industrial organizations are seen as prime targets. Among these organizations at risk are the [...]

Cybersecurity: the new challenge facing the maritime sector

September 26th, 2017|Categories: ICS & Cybersecurity|

Ships rely on information systems, especially industrial IS, to run many of their essential processes: navigation, nautical security, communication, steering, propulsion and energy production, just to name a few. Like with all other information [...]

Cyber Control Room: An innovative concept for the surveillance and detection of industrial cyber threats

September 19th, 2017|Categories: ICS & Cybersecurity|

The industrial cyber threats that have been making headlines over the past few years are no longer examples of mere espionage or the misappropriation of confidential data. Today’s cyber threats allow an attacker to [...]

📁 The Sentryo Files: Industries vs. Cyberattacks
Episode 5: A water treatment plant under attack

September 12th, 2017|Categories: Use cases|

Previously in the Sentryo Files we talked about a connected car hack and an attack on a pipeline. Now we will turn to a cyberattack on a water treatment plant. In 2015, hackers hacked [...]

📁 The Sentryo Files: Industries vs. Cyberattacks
Episode 4: A Breton water current turbine victim of a ransomware

September 5th, 2017|Categories: Use cases|

In the previous episodes of The Sentryo Files: Industries vs. Cyberattacks, we talked about a connected car, an oil pipeline and a supervisory computer used to divert water... In this fourth episode, we will [...]