
Top ICS factors to consider while selecting an OT/ICS cybersecurity solution
Explore Sectrio’s solutions today: Solutions | Products | Services | SOC Choosing an OT/ICS cybersecurity solution can be a long-drawn process if the right parameters are not considered. Common pitfalls that need to be avoided while selecting an OT/ICS cybersecurity solution include In order to select the right solution, the ... Read More

Developing customized OT security policy in complex industrial environmentsÂ
Explore Sectrio’s solutions today: Solutions | Products | Services | SOC For most Operational Technology (OT) operators, an IT security policy is often the default policy instrument for ICS security. The IT security policy is even relied upon for complex OT systems including remote sites.  This brings forth a clear ... Read More

Addressing the key OT/ICS and IoT cybersecurity challenges in the oil and gas industryÂ
An industry veteran brought out an interesting point at a recently concluded cybersecurity conference. As per him, cybersecurity in the oil and gas industry across upstream, midstream and downstream segments involved a complex play of OEM priorities, asset and site complexities, varying plant specificities, and employee awareness levels. Despite being ... Read More

Phantom OT is the number one threat to industrial security Â
What is phantom OT? Â Phantom OT comprises systems that operate without any policy, security, or governance controls within an enterprise. They are either outside the realm of any security intervention or are deliberately overlooked in terms of security measures and policy recommendations because:Â An AI-Generated tool paints an apt ... Read More

Risk Assessment and Gap Analysis for Industrial Control System infrastructure: the core essentials Â
Conducting a risk assessment and gap analysis exercise for Industrial Control System environments is important from cybersecurity, business continuity, and risk mitigation perspectives. It is important to bring the risk exposure down to acceptable levels and minimize the risk tolerance with every assessment cycle so that the overall risk sensitivity ... Read More

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil
The lack of any large cyber incidents doesn’t mean things are still deep under. Instead, this could well be the lull before a cyberstorm.    Earlier this week, Iran-linked APT group Charming Kitten (aka Ballistic Bobcat APT, APT35, and Phosphorus) initiated a fresh cyber espionage campaign targeting 14 countries across the ... Read More

An integrated OT SOC: Cost or Investment?
A dedicated OT Security Operations Center offers a strong foundation for launching and supporting many institutional security measures such as continuous threat detection, unified view and visibility, and OT governance and policy implementation. Â When done well, a managed OT SOC can serve as a nerve center for all OT security ... Read More

Why the new AI cybercrime tool is just the tip of the iceberg
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition of our IoT and OT threat landscape report, we had predicted this trend with supporting data. Our prediction ... Read More

Looking ahead of CEA guidelines to secure the power sector in India
India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured steps to improve their overall cybersecurity posture and protect critical infrastructure from cyber attacks through specific interventions. The ... Read More

Deciphering the latest attack on AIIMS Â Â Â
In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also highlighted the alarming levels of sophistication and maturity demonstrated by state-backed hackers that are targeting Indian critical infrastructure, ... Read More