New intrusion detection methods for power stations

Power grids are very large, so it is difficult to secure each point of the network and establish a trusted relationship between each device. In order to be able to track events as they are happening, monitoring solutions are used. However, an attacker can compromise the system and send false information, which has already happened […]

Global aluminium producer victim of a massive cyber attack

Norsk Hydro hit by ransomware Norsk Hydro is a Norwegian group that is one of the leaders in the production, refining, manufacturing and recycling of aluminum products. On March 19th, Norsk Hydro’s IT infrastructure suffered a cyber attack that impacted the company’s factories around the world. In order to complete the production orders, the company […]

Sentryo’s New QRadar app Enables Integrated IT/OT SOC

IBM QRadar is a Security Information and Event Management (SIEM) platform designed to give cybersecurity experts visibility across the corporate IT environment, monitor the company’s security posture and accelerate incident response. It consolidates log, network flow and event data from all devices, endpoints and applications distributed throughout the enterprise network. Using advanced analytics and correlation […]

You Have Decided To Secure Your OT Environment. Now What?

As many other industrial corporations, you have decided to address the challenges of securing your OT network. But where and how should you start? WannaCry. NotPetya. CrashOverride. Triton. Cyber attacks don’t only target IT networks. Some are even specifically designed to disrupt industrial networks such as the attack on the Ukrainian power grid, or the […]

industrial cybersecurity

Industrial cybersecurity vs. traditional cybersecurity

Industrial control systems (ICS) are often considered to be isolated systems, safeguarded from the risks of cyberattack. However, these systems are also vulnerable! This is mainly because of the development of the Industrial Internet of things (IIoT), the increasingly stronger interconnection between operational technology and IT networks, and the convergence towards traditional technology (standard network […]

decision tree: industrial cybersecurity solution

[Infographics decision tree] Do you need an industrial cybersecurity solution?

The industrial sector and its players heavily rely on interconnected IT systems. We often assume that, because industrial networks are connected only to an industrial internet, vulnerabilities are few and far between…. Wrong! Industrial systems are more exposed to cyber threats than what it may seem and the consequences may be huge. Investing in a […]

poisoning of tap water

The Sentryo Files
Season 2 – Episode 7: Poisoning of tap water in the US

The Sentryo Files examine a past cyberattack aimed at poisoning tap water in the US state of Georgia. Residents left without tap water after an attack on a water treatment plant In 2013, someone broke into the precinct of the water treatment plant and managed to change chemical levels used to treat the water. Around […]

brute force attack

How to protect yourself from a brute force attack?

We often read in the Sentryo magazine… Industry 4.0 is full of promises but also represents security threats for industrial networks! Of these threats, the most long-standing and persistent attack is, without a doubt, the brute force attack. How can you effectively protect yourself against this type of cyberattack? We analyze the vulnerabilities and the […]

Havex Malware energy sector

The Sentryo Files
Season 2 – Episode 6: Havex malware vs. the energy sector

In a previous episode of The Sentryo Files, we talked about a cyberattack on a Soviet oil pipeline at the end of the Cold War… Today find out about the massive espionage campaign waged on companies in the energy sector by the Havex malware in 2013 and 2014. Over 1000 companies in the energy sector […]