UncategorizedTechpapersMeasuring the hardware capacities for OT Devices in an ICSNovember 24, 2022question_answer0When developing a new solution for network analysis and monitoring, choosing the right hardware configuration is a one of the…
TechpapersVulnerability scanners in OT networks: a quick overviewSeptember 21, 2022question_answer0The field of cybersecurity has a well deserved relevance into the operational design of any company or organization nowadays. While…
TechpapersDNP3 protocol securitySeptember 21, 2022question_answer0DNP3 is an industrial communication protocol used between components in process automation systems. It was developed for communication between several…
TechpapersTechnical Article | Manipulating ModbusSeptember 14, 2022question_answer0Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in…
TechpapersOpen-source intelligence (OSINT)July 26, 2022question_answer0In today’s post, our colleague Hugues Bové will explain through a techpaper the usefulness of open source intelligence (OSINT). This…
TechpapersHow to choose the right IDS for OT networksMay 4, 2021question_answer0For an effective protection of all the elements of an industrial ecosystem against threats, it is necessary to understand the…
TechpapersThe future of the industrial monitoring systemMay 4, 2021question_answer0In today’s post, “The Future of Industrial Monitoring System, a Blueprint for an AI Empowered OT Threat Detection System”, a…