Sentryo’s New QRadar app Enables Integrated IT/OT SOC

IBM QRadar is a Security Information and Event Management (SIEM) platform designed to give cybersecurity experts visibility across the corporate IT environment, monitor the company’s security posture and accelerate incident response. It consolidates log, network flow and event data from all devices, endpoints and applications distributed throughout the enterprise network. Using advanced analytics and correlation […]

You Have Decided To Secure Your OT Environment. Now What?

As many other industrial corporations, you have decided to address the challenges of securing your OT network. But where and how should you start? WannaCry. NotPetya. CrashOverride. Triton. Cyber attacks don’t only target IT networks. Some are even specifically designed to disrupt industrial networks such as the attack on the Ukrainian power grid, or the […]

industrial cybersecurity

Industrial cybersecurity vs. traditional cybersecurity

Industrial control systems (ICS) are often considered to be isolated systems, safeguarded from the risks of cyberattack. However, these systems are also vulnerable! This is mainly because of the development of the Industrial Internet of things (IIoT), the increasingly stronger interconnection between operational technology and IT networks, and the convergence towards traditional technology (standard network […]

decision tree: industrial cybersecurity solution

[Infographics decision tree] Do you need an industrial cybersecurity solution?

The industrial sector and its players heavily rely on interconnected IT systems. We often assume that, because industrial networks are connected only to an industrial internet, vulnerabilities are few and far between…. Wrong! Industrial systems are more exposed to cyber threats than what it may seem and the consequences may be huge. Investing in a […]

poisoning of tap water

The Sentryo Files
Season 2 – Episode 7: Poisoning of tap water in the US

The Sentryo Files examine a past cyberattack aimed at poisoning tap water in the US state of Georgia. Residents left without tap water after an attack on a water treatment plant In 2013, someone broke into the precinct of the water treatment plant and managed to change chemical levels used to treat the water. Around […]

brute force attack

How to protect yourself from a brute force attack?

We often read in the Sentryo magazine… Industry 4.0 is full of promises but also represents security threats for industrial networks! Of these threats, the most long-standing and persistent attack is, without a doubt, the brute force attack. How can you effectively protect yourself against this type of cyberattack? We analyze the vulnerabilities and the […]

Havex Malware energy sector

The Sentryo Files
Season 2 – Episode 6: Havex malware vs. the energy sector

In a previous episode of The Sentryo Files, we talked about a cyberattack on a Soviet oil pipeline at the end of the Cold War… Today find out about the massive espionage campaign waged on companies in the energy sector by the Havex malware in 2013 and 2014. Over 1000 companies in the energy sector […]

connected industrial robots

Industry 4.0: Industrial robots vs. Cyberattacks

Industry 4.0 represents a major cybersecurity challenge for companies. In a study conducted by Trend Micro and the Polytechnic University of Milan, a team of researchers and students in the field of cybersecurity successfully demonstrated the vulnerability of industrial robots. This weakness is coupled with the era of artificial intelligence and the IIoT! The security […]

control room industrial cyberattacks

Best practices for enforcing the security of industrial systems

In a previous article about the specific features of industrial systems, we discussed the cybersecurity challenges related to these types of networks and the constraints in ensuring their protection. Find out about some best practices you can adopt in order to fight against industrial cyberattacks and overcome the vulnerabilities of industrial systems when it comes […]