Categories

Meet our OT team: Bruce Large

We’re the OT security specialists, and we want you to get to know our team better. We sat down with Bruce Large, Principal OT Security Architect and Chief Evangelist, to find out more about his OT journey, OT cyber security concerns, and what he is excited to achieve in his new Secolve role.    How… Continue reading Meet our OT team: Bruce Large

What is ISO 27001?

The ISO 27001 is one of the most well-known standards globally, and plays a crucial role in safeguarding information's confidentiality, integrity, and availability across various sectors and sizes of organisations. But is it the right one to choose from the numerous options for cyber security frameworks and standards to assist in securing your operational technology… Continue reading What is ISO 27001?

A quick guide to addressing unusual activity on OT systems 

Noticing unusual activity on operational technology (OT) systems is a serious cause for concern. When spotted, prompt and appropriate actions should be taken to prevent harm or disruptions to critical infrastructure. In this blog, we’ll explore what unusual activity on OT systems could look like and the recommended steps to be followed to isolate, investigate,… Continue reading A quick guide to addressing unusual activity on OT systems 

NIST SP 800-82 Revision 3 highlights and key differences

The National Institute of Standards and Technology (NIST) has published the final version of Special Publication 800-82 Revision 3. In this blog, we’ll give a high-level overview of the NIST SP 800-82 cyber security framework and look at the core updates and improvements covered in Revision 3, as compared to the previous 2 versions.    NIST SP… Continue reading NIST SP 800-82 Revision 3 highlights and key differences

What is NIST-CSF?

The NIST Cyber Security Framework (NIST-CSF) was born out of the need for a standardised approach to cyber security and has evolved into a versatile tool used globally. In this blog, we explore a high-level overview of the NIST-CSF, including its origins and structure. We’ll also explore its application in the Australian critical infrastructure landscape,… Continue reading What is NIST-CSF?

What is the AESCSF?

The Australian Energy Sector Cyber Security Framework (AESCSF) offers a tailored approach to bolstering cyber security for OT environments within Australia’s energy sector. In this blog, we provide an overview of this framework, explore its role in the uplifting security standards in Australian operational technology (OT) systems, as well as potential challenges that organisations may encounter… Continue reading What is the AESCSF?

What is the Essential Eight (E8) framework?

The Essential Eight framework has its roots in IT security but has also found application in OT cyber security with its structured approach to tackling challenges that emerge at the intersection of technology and industry. In this blog, we explore this foundational framework, its use in securing OT environments, and why you may or may… Continue reading What is the Essential Eight (E8) framework?

Why organisations need OT security awareness training

Critical infrastructure organisations underpin the functioning of society, relying on operational technology (OT) systems and industrial control systems (ICS), to manage and control crucial operations, from power plants to transportation networks. However, as technology advances, so do the risks of cyber threats and attacks targeting these critical systems.     Securing traditional OT environments requires a… Continue reading Why organisations need OT security awareness training