Threat actor groups targeting critical infrastructure

Aerial View of Two Environmental engineers work at wastewater treatment plants, Water management concept.

Understanding threat actor groups, their methods, and the systems they target is crucial for protecting critical infrastructure. In this blog, we highlight the various threat actor groups targeting critical infrastructure, providing a brief overview of their associated activities, methods, and indicators of compromise. Understanding these parameters can better equip organisations in their defence strategies.   … Continue reading Threat actor groups targeting critical infrastructure

What is Cyber Security Architecture?

Renewable energy, solar panels and team walking on roof planning for inspection at sustainable business. Engineering, sustainability and photovoltaic power on rooftop, men in electricity maintenance.

Understanding cyber security architecture and its role in managing risks is fundamental in ensuring the protection of an organisation’s assets. In this blog, we will explore cyber security architecture, how it helps align security strategies with business objectives, and the differences between enterprise security architecture, solution architecture, and design.   Cyber security architecture defined  … Continue reading What is Cyber Security Architecture?

Published
Categorized as OT security

Meet our OT team: Bruce Large

We’re the OT security specialists, and we want you to get to know our team better. We sat down with Bruce Large, Principal OT Security Architect and Chief Evangelist, to..

What is ISO 27001?

ISO standard certification standardisation quality control 27001.

The ISO 27001 is one of the most well-known standards globally, and plays a crucial role in safeguarding information’s confidentiality, integrity, and availability

A quick guide to addressing unusual activity on OT systems 

man hand on laptop with exclamation mark on virtual screen, online safety warning , caution warning sing for notification error

Noticing unusual activity on operational technology (OT) systems is a serious cause for concern. When spotted, prompt and appropriate actions should be taken to prevent..

NIST SP 800-82 Revision 3 highlights and key differences

The National Institute of Standards and Technology (NIST) has published the final version of Special Publication 800-82 Revision 3. In this blog, we’ll give a high-level overview of the NIST SP 800-82 cyber security framework and look at the core updates and improvements covered in Revision 3, as compared to the previous 2 versions.    NIST SP… Continue reading NIST SP 800-82 Revision 3 highlights and key differences

What is NIST-CSF?

The NIST Cyber Security Framework (NIST-CSF) was born out of the need for a standardised approach to cyber security and has evolved into a versatile tool used globally. In this blog, we explore a high-level overview of the NIST-CSF, including its origins and structure. We’ll also explore its application in the Australian critical infrastructure landscape,… Continue reading What is NIST-CSF?

What is the AESCSF?

The Australian Energy Sector Cyber Security Framework (AESCSF) offers a tailored approach to bolstering cyber security for OT environments within Australia’s energy sector. In this blog, we provide an overview of this framework, explore its role in the uplifting security standards in Australian operational technology (OT) systems, as well as potential challenges that organisations may encounter… Continue reading What is the AESCSF?