Category: OT security

Categories

What is Cyber Security Architecture?

Understanding cyber security architecture and its role in managing risks is fundamental in ensuring the protection of an organisation’s assets. In this blog, we will explore cyber security architecture, how it helps align security strategies with business objectives, and the differences between enterprise security architecture, solution architecture, and design.   Cyber security architecture defined  … Continue reading What is Cyber Security Architecture?

Cyber-attacks on the Ports and Maritime industry 

This blog examines some examples of the diverse types of cyber-attacks that have occurred in the Ports & Maritime industry. By gaining insights into some of the various impacts across OT & IT we then look at what areas to consider building resilience against such attacks.   What are the different types of cyber-attacks that could potentially occur and what are the impacts of these cyber-attacks in the… Continue reading Cyber-attacks on the Ports and Maritime industry 

OT security: what is it and should we be worried?

Barely a day goes by without some form of cyber attack hitting the headlines – no small feat in a time of a deadly global pandemic.   While the majority of attacks have targeted organisations’ IT processes, experts agree it’s only a matter of time before hackers set their sights on the operational technology (OT)… Continue reading OT security: what is it and should we be worried?

How to improve your OT cyber security maturity

With daily reports of OT security breaches and imminent changes to local legislation, it has never been more important for businesses to review their security settings. This can seem overwhelming, but no matter what your business’s size, it should be guided by three basic questions.    What is your baseline security level? Every organisation, big… Continue reading How to improve your OT cyber security maturity

Would you risk it for a brisket?

Cyber security has become a hot topic across the world and an area that governments are paying more attention to, particularly around critical infrastructure. Every day, people across the globe wake up to the news of a new cyberattack, often in the form of crippling ransomware that encrypts files and locks users out of systems… Continue reading Would you risk it for a brisket?

IoT/OT Defence: Removing The Myth Pragmatically

The threat posed by state-sponsored threat actors on critical infrastructure has been a heated topic of discussion since 2010 and again this week the ACSC raised further concerns. While a lot of attention has been given to the malware and tactics used by advanced persistent threat groups, and rightfully so as it enables better defence… Continue reading IoT/OT Defence: Removing The Myth Pragmatically