Factors to consider while selecting an OTICS & IoT cybersecurity solution

Top ICS factors to consider while selecting an OT/ICS cybersecurity solution

| | CISO, Incident Response, iot, OT, threats
Explore Sectrio’s solutions today: Solutions | Products | Services | SOC Choosing an OT/ICS cybersecurity solution can be a long-drawn process if the right parameters are not considered. Common pitfalls that need to be avoided while selecting an OT/ICS cybersecurity solution include In order to select the right solution, the ... Read More
OT Security policy - Blog

Developing customized OT security policy in complex industrial environments 

| | Cyber Security, Oil and Gas
Explore Sectrio’s solutions today: Solutions | Products | Services | SOC For most Operational Technology (OT) operators, an IT security policy is often the default policy instrument for ICS security. The IT security policy is even relied upon for complex OT systems including remote sites.   This brings forth a clear ... Read More
Oil & Gas Sector Addressing the key OTICS and IoT Security challenges

Addressing the key OT/ICS and IoT cybersecurity challenges in the oil and gas industry 

| | Cyber Security, Oil and Gas
An industry veteran brought out an interesting point at a recently concluded cybersecurity conference. As per him, cybersecurity in the oil and gas industry across upstream, midstream and downstream segments involved a complex play of OEM priorities, asset and site complexities, varying plant specificities, and employee awareness levels. Despite being ... Read More
Phantom OT Threat To industrial security

Phantom OT is the number one threat to industrial security  

| | Cyber Security, OT
What is phantom OT?   Phantom OT comprises systems that operate without any policy, security, or governance controls within an enterprise. They are either outside the realm of any security intervention or are deliberately overlooked in terms of security measures and policy recommendations because:  An AI-Generated tool paints an apt ... Read More
The Essentials Industrial Risk Assessment and Gap ANALYSIS

Risk Assessment and Gap Analysis for Industrial Control System infrastructure: the core essentials  

| | Cyber Security, OT
Conducting a risk assessment and gap analysis exercise for Industrial Control System environments is important from cybersecurity, business continuity, and risk mitigation perspectives. It is important to bring the risk exposure down to acceptable levels and minimize the risk tolerance with every assessment cycle so that the overall risk sensitivity ... Read More
Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

The lack of any large cyber incidents doesn’t mean things are still deep under. Instead, this could well be the lull before a cyberstorm.     Earlier this week, Iran-linked APT group Charming Kitten (aka Ballistic Bobcat APT, APT35, and Phosphorus) initiated a fresh cyber espionage campaign targeting 14 countries across the ... Read More
An integrated OT SOC: Cost or Investment?

An integrated OT SOC: Cost or Investment?

| | ICS, OT
A dedicated OT Security Operations Center offers a strong foundation for launching and supporting many institutional security measures such as continuous threat detection, unified view and visibility, and OT governance and policy implementation.  When done well, a managed OT SOC can serve as a nerve center for all OT security ... Read More
Why the new AI cybercrime tool is just the tip of the iceberg

Why the new AI cybercrime tool is just the tip of the iceberg

| | FEATURED, ICS, OT
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition of our IoT and OT threat landscape report, we had predicted this trend with supporting data. Our prediction ... Read More
Looking ahead of CEA guidelines to secure the power sector in India

Looking ahead of CEA guidelines to secure the power sector in India

| | FEATURED, OT, Utilities
India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured steps to improve their overall cybersecurity posture and protect critical infrastructure from cyber attacks through specific interventions. The ... Read More
Deciphering the latest attack on AIIMS    

Deciphering the latest attack on AIIMS    

In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also highlighted the alarming levels of sophistication and maturity demonstrated by state-backed hackers that are targeting Indian critical infrastructure, ... Read More