decision tree: industrial cybersecurity solution

[Infographics decision tree] Do you need an industrial cybersecurity solution?

The industrial sector and its players heavily rely on interconnected IT systems. We often assume that, because industrial networks are connected only to an industrial internet, vulnerabilities are few and far between…. Wrong! Industrial systems are more exposed to cyber threats than what it may seem and the consequences may be huge. Investing in a […]

poisoning of tap water

The Sentryo Files
Season 2 – Episode 7: Poisoning of tap water in the US

The Sentryo Files examine a past cyberattack aimed at poisoning tap water in the US state of Georgia. Residents left without tap water after an attack on a water treatment plant In 2013, someone broke into the precinct of the water treatment plant and managed to change chemical levels used to treat the water. Around […]

brute force attack

How to protect yourself from a brute force attack?

We often read in the Sentryo magazine… Industry 4.0 is full of promises but also represents security threats for industrial networks! Of these threats, the most long-standing and persistent attack is, without a doubt, the brute force attack. How can you effectively protect yourself against this type of cyberattack? We analyze the vulnerabilities and the […]

Havex Malware energy sector

The Sentryo Files
Season 2 – Episode 6: Havex malware vs. the energy sector

In a previous episode of The Sentryo Files, we talked about a cyberattack on a Soviet oil pipeline at the end of the Cold War… Today find out about the massive espionage campaign waged on companies in the energy sector by the Havex malware in 2013 and 2014. Over 1000 companies in the energy sector […]

connected industrial robots

Industry 4.0: Industrial robots vs. Cyberattacks

Industry 4.0 represents a major cybersecurity challenge for companies. In a study conducted by Trend Micro and the Polytechnic University of Milan, a team of researchers and students in the field of cybersecurity successfully demonstrated the vulnerability of industrial robots. This weakness is coupled with the era of artificial intelligence and the IIoT! The security […]

control room industrial cyberattacks

Best practices for enforcing the security of industrial systems

In a previous article about the specific features of industrial systems, we discussed the cybersecurity challenges related to these types of networks and the constraints in ensuring their protection. Find out about some best practices you can adopt in order to fight against industrial cyberattacks and overcome the vulnerabilities of industrial systems when it comes […]

sharing security information

Information sharing: the key to cybersecurity

Sharing security information is primordial if companies want to remain up to date with trends in cyberattacks, enrich and fine-tune their reference databases, and improve their security solutions. A more relevant risk analysis Knowing how to properly use the information available is a determining factor in securing your IT and OT networks. The data in […]

new generation industrial sabotage

Cyberthreats to industrial systems: new generation industrial sabotage

In a series of 3 articles, Sentryo will take you through an analysis of the cyberattack threats hovering over industrial systems. After the issue of confidential data theft in the first article, today in this second article find out about new generation industrial sabotage and how to protect yourself. Before going any further, read the […]

theft of confidential data

Cyberthreats to industrial systems: theft of confidential data

In a series of 3 articles Sentryo will take you through an analysis of the cyberattack threats hovering over industrial systems. From intellectual property theft to industrial sabotage, each article will describe a scenario industrial companies fear the most! Let’s start with the case of a cyberattack aimed at stealing confidential information. Before going any […]