The Need for Continuous Monitoring of OT Networks

February 13, 2019

In recent years there have been numerous events of different threat severity, involving critical and industrial infrastructure. Famous incident names like “Wannacry” ,“Havex” and “Triton” are just a few and represent merely the tip of the iceberg. Some attacks on OT infrastructure are “industry-specific” and even “organizational-specific” targeting specific industrial sectors, or specific vendor equipment models. But others are “global,” sometimes targeting IT-typical infrastructure, and still, hit many industrial networks which - even if not been main targets of the attack - become victims of it.

Spotlight

PACTF

PACTF charges teams of 1–5 to hack, decrypt, and do whatever it takes to solve increasingly challenging security puzzles. Our mission? Make cyber-security as fun—and educational—as possible. Unlike traditional learning approaches, PACTF has students learn by having them break vulnerable systems themselves. Teams face carefully designed problems, and on successfully execution of an attack, teams can submit proof called ‘flags’ to our website for feedback, fun and points.

OTHER WHITEPAPERS
news image

Veritas Alta SaaS Protection

whitePaper | January 25, 2023

Veritas Alta™ SaaS Protection (formerly known as Netbackup SaaS Protection) is a cloud-based secondary storage platform for enterprise organizations to centrally protect, analyze, search, and manage all types of SaaS application data at any scale.

Read More
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More

Spotlight

PACTF

PACTF charges teams of 1–5 to hack, decrypt, and do whatever it takes to solve increasingly challenging security puzzles. Our mission? Make cyber-security as fun—and educational—as possible. Unlike traditional learning approaches, PACTF has students learn by having them break vulnerable systems themselves. Teams face carefully designed problems, and on successfully execution of an attack, teams can submit proof called ‘flags’ to our website for feedback, fun and points.

Events