OT & IIoT Security Mag 

Cyber Control Room: An innovative concept for the surveillance and detection of industrial cyber threats

September 19th, 2017|Categories: ICS & Cybersecurity|

The industrial cyber threats that have been making headlines over the past few years are no longer examples of mere espionage or the misappropriation of confidential data. Today’s cyber threats allow an attacker to [...]

The Sentryo Files: Industries vs. Cyberattacks
Episode 3: The cyberattack on the Tehama Colusa Canal Authority

September 14th, 2017|Categories: Use cases|

In our previous episodes, we talked about the hijacking of a connected car and a cyberattack on an oil pipeline. Episode three of the Sentryo Files: Industries vs. Cyberattacks takes a look at the cyberattacks [...]

The Sentryo Files: Industries vs. cyberattacks
Episode 2: Attack on the BTC oil pipeline in 2008

September 7th, 2017|Categories: Use cases|

The saga Sentryo Files: Industries vs. Cyberattacks continues... Previously, in our last episode, we talked about the hijacking of a connected car in 2015. As for episode 2, we are turning to the pipeline cyberattack. [...]

The Sentryo Files: Industries vs. cyberattacks
Episode 01: Cyberattack on a Jeep Cherokee in 2015

August 31st, 2017|Categories: Use cases|

This fall, Sentryo invites you to take a look back at a series of emblematic cyberattacks: discover the first episode of the saga The Sentryo Files: Industries vs. Cyberattacks with the hijacking of a connected [...]

Analysis of cyberattack against Ukraine’s power grid on December 23, 2015

July 18th, 2017|Categories: Use cases|

On December 23 2015, three power distribution centers providing electricity for western Ukraine were simultaneously struck by a cyberattack causing several hours of power outages for hundreds of thousands of homes. This article aims to [...]