The Need for Continuous Monitoring of OT Networks

February 13, 2019

In recent years there have been numerous events of different threat severity, involving critical and industrial infrastructure. Famous incident names like “Wannacry” ,“Havex” and “Triton” are just a few and represent merely the tip of the iceberg. Some attacks on OT infrastructure are “industry-specific” and even “organizational-specific” targeting specific industrial sectors, or specific vendor equipment models. But others are “global,” sometimes targeting IT-typical infrastructure, and still, hit many industrial networks which - even if not been main targets of the attack - become victims of it.

Spotlight

BlueCat

BlueCat delivers software-based DNS, DHCP and IP Address Management (DDI) solutions enabling our customers to build and manage their most complex network infrastructure to meet the rapid change of pace of their business. All enterprise infrastructure depends on DDI at its core, to operate effectively. Our technology is adaptive and open, giving our customers the flexibility to grow their networks without rearchitecting at every expansion point. Our DDI solutions are used by hundreds of market leading companies. We pride ourselves on how closely we work with our customers and partners and the expertise of our team brings more value than just the software itself.

OTHER WHITEPAPERS
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More

Spotlight

BlueCat

BlueCat delivers software-based DNS, DHCP and IP Address Management (DDI) solutions enabling our customers to build and manage their most complex network infrastructure to meet the rapid change of pace of their business. All enterprise infrastructure depends on DDI at its core, to operate effectively. Our technology is adaptive and open, giving our customers the flexibility to grow their networks without rearchitecting at every expansion point. Our DDI solutions are used by hundreds of market leading companies. We pride ourselves on how closely we work with our customers and partners and the expertise of our team brings more value than just the software itself.

Events