Articles

admin

ICS Patching
When Should We Patch ICS Assets?

The decision to patch ICS assets is a topic of significant debate in the cybersecurity community. Unlike IT systems, where patching is generally encouraged to address vulnerabilities, ICS environments often prioritize stability and availability, leading to differing views on whether patching should be immediate or even necessary in every case. Many experts argue that patching…

View details
OTIFYD & MAD20 Partnership
OTIFYD and MAD20 (MITRE ATT&CK DEFENDER 2.0) Join Forces to Close Cybersecurity Skill Gaps in the Middle East

Riyadh, Saudi Arabia, LEAP Event, March 2024 – OTIFYD, EMEA’s next-generation OT security services provider, has signed a partnership with MAD20™ Technologies, the MITRE ATT&CK® DefenderTM training and certification provider across the GCC and Turkey regions. The partnership between OTIFYD and MAD20 helps to close the persistent cybersecurity skills gap, teaching cyber practitioners how best…

View details
OTIFYD NanoLock Security Partnership
NanoLock Security and OTIFYD Partner to Provide World’s Leading Industrial Cyber Protection to European Companies

December 12, 2023 – NanoLock Security, a leading provider of device-level, zero-trust OT protection for industrial manufacturing companies, and OTIFYD, EMEA’s next generation OT security services and solutions provider with an elite team of highly trained industrial and cybersecurity engineers and certified experts, are partnering to provide manufacturing and industrial companies with device-level zero-trust OT…

View details
OT security standards
Beyond Compliance: Will Cybersecurity Regulations Keep Up with the Evolution of Threats?

Beyond Compliance: Will Cybersecurity Regulations Keep Up with the Evolution of Threats? In the age of digital connectivity, the critical importance of securing Operational Technology (OT) systems cannot be overstated. Governments and industries are responding to the escalating threats by introducing regulations tailored to OT security. Prominent examples include the Network and Information Systems Directive…

View details
Controller Area Network (CAN)
Hacking Controller Area Network (CAN Bus)

Hacking Controller Area Network (CAN Bus) What is Controller Area Network (CAN Bus)? In short words, it’s a communication system made for vehicle intercommunication. It is a network protocol that is commonly used in automobiles to allow different electronic components within the vehicle to communicate with each other over a shared two-wire bus. However, CAN is also…

View details
Cascading Supply Chain Attack
Cascading Supply Chain Attack

Cascading Supply Chain Attack In recent years, supply chain attacks have become one of the most significant threats to cybersecurity. Hackers are using these attacks to gain unauthorized access to systems and data, which can cause a cascade of events that can be devastating to an organization. This article will discuss the cascading supply chain…

View details
OTIFYD Waterfall security Partnership Announcement
OTIFYD and Waterfall Security Partner to Secure OT Networks

OTIFYD and Waterfall Security Partner to Secure OT Networks   London, United Kingdom, April 4, 2023: OTIFYD, EMEA’s next generation OT security services and solutions provider , and Waterfall Security Solutions, the OT security company, today announce a strategic partnership to strengthen industrial cybersecurity in many industries. This collaboration provides OTIFYD’s customers with secure and consolidated IT/OT integration technology that…

View details