Articles

admin

OTIFYD & MAD20 Partnership
OTIFYD and MAD20 (MITRE ATT&CK DEFENDER 2.0) Join Forces to Close Cybersecurity Skill Gaps in the Middle East

Riyadh, Saudi Arabia, LEAP Event, March 2024 – OTIFYD, EMEA’s next-generation OT security services provider, has signed a partnership with MAD20™ Technologies, the MITRE ATT&CK® DefenderTM training and certification provider across the GCC and Turkey regions. The partnership between OTIFYD and MAD20 helps to close the persistent cybersecurity skills gap, teaching cyber practitioners how best…

View details
OTIFYD NanoLock Security Partnership
NanoLock Security and OTIFYD Partner to Provide World’s Leading Industrial Cyber Protection to European Companies

December 12, 2023 – NanoLock Security, a leading provider of device-level, zero-trust OT protection for industrial manufacturing companies, and OTIFYD, EMEA’s next generation OT security services and solutions provider with an elite team of highly trained industrial and cybersecurity engineers and certified experts, are partnering to provide manufacturing and industrial companies with device-level zero-trust OT…

View details
OT security standards
Beyond Compliance: Will Cybersecurity Regulations Keep Up with the Evolution of Threats?

Beyond Compliance: Will Cybersecurity Regulations Keep Up with the Evolution of Threats? In the age of digital connectivity, the critical importance of securing Operational Technology (OT) systems cannot be overstated. Governments and industries are responding to the escalating threats by introducing regulations tailored to OT security. Prominent examples include the Network and Information Systems Directive…

View details
Controller Area Network (CAN)
Hacking Controller Area Network (CAN Bus)

Hacking Controller Area Network (CAN Bus) What is Controller Area Network (CAN Bus)? In short words, it’s a communication system made for vehicle intercommunication. It is a network protocol that is commonly used in automobiles to allow different electronic components within the vehicle to communicate with each other over a shared two-wire bus. However, CAN is also…

View details
Cascading Supply Chain Attack
Cascading Supply Chain Attack

Cascading Supply Chain Attack In recent years, supply chain attacks have become one of the most significant threats to cybersecurity. Hackers are using these attacks to gain unauthorized access to systems and data, which can cause a cascade of events that can be devastating to an organization. This article will discuss the cascading supply chain…

View details
OTIFYD Waterfall security Partnership Announcement
OTIFYD and Waterfall Security Partner to Secure OT Networks

OTIFYD and Waterfall Security Partner to Secure OT Networks   London, United Kingdom, April 4, 2023: OTIFYD, EMEA’s next generation OT security services and solutions provider , and Waterfall Security Solutions, the OT security company, today announce a strategic partnership to strengthen industrial cybersecurity in many industries. This collaboration provides OTIFYD’s customers with secure and consolidated IT/OT integration technology that…

View details
Managing Negative PR Implications After a Cyberattack
Managing Negative PR Implications After a Cyberattack on Critical Infrastructure: Guidelines for Effective Crisis Response

Managing Negative PR Implications After a Cyberattack on Critical Infrastructure Guidelines for Effective Crisis Response Cyberattacks on critical infrastructure can have devastating consequences, including negative PR implications for the organization responsible for maintaining the infrastructure. In addition to the immediate risks to public safety, a hack can damage the organization’s reputation, leading to loss of…

View details