ICS MALWARE SANDBOX

January 22, 2019

Industrial Control System (ICS) and IIoT networks require specialized security capabilities because traditional IT sandboxes cannot “explode” or run ICS malware. Traditional IT malware sandboxes provide an environment in which malware is allowed to roam free so that its behavior and payloads can be studied. VirusTotal, for example, has been around for years and provides a valuable resource by allowing analysts to upload suspected malware to a cloud-based environment, where they can then observe whether commercial anti-malware programs detect the malware, without suffering ill effects.

Spotlight

Telenor India

Telenor (India) Communications is a wholly owned company of Norway-based Telenor Group and offers mobile telephony services under the brand Telenor. The company launched it services in 2009 and till recently was known as Uninor in the market. Telenor’s pre-paid GSM mobile services are commercially available in the six circles of UP (West), UP (East), Bihar (including Jharkhand), Andhra Pradesh, Maharashtra and Gujarat. Together, these circles account for more than 50% of India’s population giving Telenor the ability to serve every second person in India.

OTHER WHITEPAPERS
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More

Spotlight

Telenor India

Telenor (India) Communications is a wholly owned company of Norway-based Telenor Group and offers mobile telephony services under the brand Telenor. The company launched it services in 2009 and till recently was known as Uninor in the market. Telenor’s pre-paid GSM mobile services are commercially available in the six circles of UP (West), UP (East), Bihar (including Jharkhand), Andhra Pradesh, Maharashtra and Gujarat. Together, these circles account for more than 50% of India’s population giving Telenor the ability to serve every second person in India.

Events