Whitepaper

OT security programs: what you need to know

Organizational and technical security checks are intended to protect plants against various types of cyber attack and abuse of assets, especially DoS attacks, mass malware and targeted ransomware attacks. From a security perspective, the challenge lies in having a networked OT infrastructure of ultramodern systems running alongside machines that are 20 to 30 years old. …

OT security programs: what you need to know Read More »

Let’s kick off the 2023 cybersecurity year:What are people planning to implement and what budgets are at hand?

Which top 15 security categories were implemented in 2022 and which are planned for 2023? What budgets are currently available for cyber security? In this article, we provide answers to these questions and, in the process, you will learn what your next steps might be and what other clients are dealing with. Download the whitepaper …

Let’s kick off the 2023 cybersecurity year:What are people planning to implement and what budgets are at hand? Read More »

How Security Operations Center detect threats and enable a rapid counter-response

A Security Operations Center (SOC) has the task of permanently monitoring a defined IT environment for security-relevant events. This usually involves analysing log files and/or data traffic for suspicious information. The aim is to detect threat scenarios and initiate appropriate countermeasures (“response”).In this whitepaper, we address the key issues in the specification of requirements, as …

How Security Operations Center detect threats and enable a rapid counter-response Read More »