BE CYBER AWARE AT SEA PHISH & SHIPS

June 2, 2018

Welcome to “Phish & Ships”, the maritime cyber security newsletter, keeping you up to date with the shipping and offshore industry initiative, “Be Cyber Aware At Sea”. Issue 19 is generously sponsored by Turrem Data Group Limited (TDG), an emerging expert player in the cybersecurity industry. The company offers leading edge and patented technologies to provide a more robust defence against the escalating threat from cybercriminal activity. TDG works to cut through the Cyber Solutions noise to provide simple, effective and fully managed services backed up by highly experienced personnel trained in the latest cyberthreat landscape. See https://www. turremgroup.com/ for more details. This time around we bring the latest news about maritime cyber security, and the implications of new guidelines, and we assess some of the latest cyber weaknesses which have been identified.

Spotlight

Unipart Cyber Security

Unipart Cyber Security, a Unipart Group company, has gained a reputation in the provision of highly regarded and quality information security services to its customers. Our suite of cyber security services focuses on three core elements when addressing cyber security risks: people, process, and technology. Our bespoke security services are delivered to both local and global organisations across an array of sectors, both public and private, and focus on building cyber security capabilities within organisations, ensuring protection against vulnerabilities, risks, and threats.

OTHER WHITEPAPERS
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 16, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

Managed Security Services Platform for SOC

whitePaper | November 23, 2022

Managed Security Services (MSS) uses a combination of People, Process and Technology to deliver Intelligent SOC Capabilities. CyberRes MSS platform collects and correlates data from multiple enterprise log sources & specialized security toolsets along with integrated with custom Threat Intelligence, SOC Portal to provide comprehensive Threat Detection & Response capabilities plus better overall security outcomes.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

Guide to Cloud Security Posture Management Tools

whitePaper | June 16, 2023

Good cloud security hygiene starts with complete visibility into the security and compliance posture of every resource you deploy into your cloud. It’s one thing to achieve this visibility in a single cloud environment—you can lean heavily on the native monitoring and auditing tools of your cloud provider, using third-party solutions to fill in gaps (e.g., threat detection)—but in a multi-cloud architecture, maintaining robust cloud security posture becomes exponentially more complex. It is much more difficult to achieve centralized visibility as well as consistently enforce policies and compliance rules within a multi-cloud environment. It’s also more complicated to detect threats and fix vulnerabilities quickly due to the sheer complexity of threats across distributed, multilayered architectures. You can address these challenges, though—and you need to, if you want to take advantage of multi-cloud architecture without compromising on security.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More

Spotlight

Unipart Cyber Security

Unipart Cyber Security, a Unipart Group company, has gained a reputation in the provision of highly regarded and quality information security services to its customers. Our suite of cyber security services focuses on three core elements when addressing cyber security risks: people, process, and technology. Our bespoke security services are delivered to both local and global organisations across an array of sectors, both public and private, and focus on building cyber security capabilities within organisations, ensuring protection against vulnerabilities, risks, and threats.

Events