OT Security End the air gapping myth in critical infrastructure security December 15, 2016 by arpit In an environment where we’re seeing increasing demand for connectivity between operational technology (OT) and IT, security teams have to dispel the air gapping myth to acknowledge that IT influences can exploit OT connections. The air gapping approach was used for a long time to prevent any impact on ICS systems. But it’s wishful thinking […] Read more » ICS SCADA
Endpoint Security Malware Terms for Non-Techies – Code Entropy December 15, 2016 by arpit Complex jargon abounds in cyber security and certain terms are widely used but little understood by anyone other than malware analysts. To help clear away a bit of the confusion, we’ll be breaking down some of these esoteric concepts, giving them practical, meaningful value. The first concept we are looking at is code entropy. To […] Read more » Code-Entropy Malware
Endpoint Security How Cyberbit EDR detected a locky ransomware attack that 22 endpoint security solutions missed December 13, 2016 by arpit On December 5th 2016 a large organization approached Cyberbit to investigate a ransomware attack. This organization is one of the world’s leading logistics and transportation companies, employing over 30,000 people. The attack had evaded all endpoint security solution over 24 hours prior to contacting Cyberbit, and begun encrypting employee workstation hard drives. The organization contacted […] Read more » Ransomware
OT Security 4 Europe Cyber Security Trends to Watch in 2017 December 6, 2016 by arpit With digital crimes that know no borders and terrorism fuelled by bits and bytes, the world is grappling with matters that are poised to disrupt the very way we live. And 2017 is already on course to cement all things cyber security-related as the defining concerns of our times. Looking at the EU’s current security […] Read more » Critical infrastructure