STATEMENT BY SMA SOLAR TECHNOLOGY AG ON THE CYBER SECURITY OF PV INVERTERS (HORUS SCENARIO)

In a presentation at the SHA2017 security conference and on a separate website https://www.horusscenario.com, the Dutch security engineer Willem Westerhof has described the scenario of a Europe-wide blackout. This scenario is based on a hypothetical, large-scale cyberattack on inverters in PV systems. He supports this scenario with a vulnerability analysis of two SMA solar inverters of the same model developed eight years ago. The analysis was conducted for a thesis together with the Dutch security company ITSec.

Spotlight

Caliber Security Partners

At Caliber Security Partners we constantly ask ourselves, “Why should our clients do business with us?” This question grounds us in our principle belief that our client defines the relationship. This belief has led us into areas such as security recruiting, risk management, as well as some very technical delivery for our clients.

OTHER WHITEPAPERS
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More

Spotlight

Caliber Security Partners

At Caliber Security Partners we constantly ask ourselves, “Why should our clients do business with us?” This question grounds us in our principle belief that our client defines the relationship. This belief has led us into areas such as security recruiting, risk management, as well as some very technical delivery for our clients.

Events