R&DTechpapersS7Comm protocol: security analyzedJanuary 19, 2023question_answer0The S7 Communication protocol (hereafter S7Comm) is a Siemens proprietary protocol that first appeared in 1994 with the launch of…
GuardianTechpapersMeasuring the hardware capacities for OT Devices in an ICSNovember 24, 2022question_answer0When developing a new solution for network analysis and monitoring, choosing the right hardware configuration is a one of the…
GuardianTechpapersVulnerability scanners in OT networks: a quick overviewSeptember 21, 2022question_answer0The field of cybersecurity has a well deserved relevance into the operational design of any company or organization nowadays. While…
Technical ConsultingTechpapersOpen-source intelligence (OSINT)July 26, 2022question_answer0In today’s post, our colleague Hugues Bové will explain through a techpaper the usefulness of open source intelligence (OSINT). This…
GuardianTechpapersHow to choose the right IDS for OT networksMay 4, 2021question_answer0For an effective protection of all the elements of an industrial ecosystem against threats, it is necessary to understand the…
GuardianTechnical ConsultingTechpapersThe future of the industrial monitoring systemMay 4, 2021question_answer0In today’s post, “The Future of Industrial Monitoring System, a Blueprint for an AI Empowered OT Threat Detection System”, a…