control room industrial cyberattacks

Best practices for enforcing the security of industrial systems

In a previous article about the specific features of industrial systems, we discussed the cybersecurity challenges related to these types of networks and the constraints in ensuring their protection. Find out about some best practices you can adopt in order to fight against industrial cyberattacks and overcome the vulnerabilities of industrial systems when it comes […]

wastewater treatment plant

The Sentryo Files
Season 2 – Episode 1: breach of a wastewater treatment plant

The Sentryo Files are back for a second season! We would like to take a look back at an emblematic cyberattack in the environmental field. Read our account of the attack on a wastewater treatment plant. Remote breach of a wastewater treatment plant in Australia In 2000 a former employee of the IT company that […]

Social Engineering Rachel Tobac

[Interview] Rachel Tobac, white hat hacker, guides you through social engineering

Rachel Tobac (@racheltobac) is a ‘white hat hacker’. Her role is to help companies and individuals protect their data by raising their awareness of the dangers of social engineering. She twice was a winner of the ‘DEFCON Social Engineering Capture the Flag’ and is now CEO and co-founder of ‘SocialProof Security’. Rachel accepted to share […]

sharing security information

Information sharing: the key to cybersecurity

Sharing security information is primordial if companies want to remain up to date with trends in cyberattacks, enrich and fine-tune their reference databases, and improve their security solutions. A more relevant risk analysis Knowing how to properly use the information available is a determining factor in securing your IT and OT networks. The data in […]

denial of service on industrial installations

Cyberthreats to industrial systems: Denial-of-service on industrial installations

After discussing industrial sabotage, our series of attack scenarios on industrial systems continues. Of these attacks, a denial-of-service on an industrial installation is particularly dangerous: it can bring continuous production lines to a long-lasting standstill. Before going any further, read the article: What is an industrial system and how to protect it? What is a […]

new generation industrial sabotage

Cyberthreats to industrial systems: new generation industrial sabotage

In a series of 3 articles, Sentryo will take you through an analysis of the cyberattack threats hovering over industrial systems. After the issue of confidential data theft in the first article, today in this second article find out about new generation industrial sabotage and how to protect yourself. Before going any further, read the […]

cisco live


Sentryo will attend Cisco Live from January 29 to February 4 in Barcelona! An unmissable event for all CISCO clients, partners and collaborators, Cisco Live 2018 will provide conferences, workshops, trainings and discoveries. Use this opportunity to participate in panel discussions, witness live demonstrations of cyberattacks and attend leading discussions. Cisco Live: from one edition […]

theft of confidential data

Cyberthreats to industrial systems: theft of confidential data

In a series of 3 articles Sentryo will take you through an analysis of the cyberattack threats hovering over industrial systems. From intellectual property theft to industrial sabotage, each article will describe a scenario industrial companies fear the most! Let’s start with the case of a cyberattack aimed at stealing confidential information. Before going any […]


ENISA: A European agency dedicated to cybersecurity

Confronted with an increasing number of cyberattacks targeting industries around the world, the European Union has decided to strengthen the powers of ENISA (European Union Agency for Network and Information Security). As such, Sentryo would like to take the opportunity to put a spotlight on the European cybersecurity agency whose main objective is to ensure […]