Blog
Blog
Cybersecurity Maturity Model Certification (CMMC) Program – Part 3
Cybersecurity Maturity Model Certification (CMMC) 2.0 is a certification framework implemented by the US Department of Defence (DoD) to protect the information and ingenuity pertinent to the national security of the US used in the process and for the sake of...
Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 2
The power grid, which is one of the most crucial pieces of critical infrastructure, is on top of the list of interest to various APTs (Advanced Persistent Threat – stealthy threat actor, typically nation or state-sponsored) and other threat actors. Hence the...
Cybersecurity Maturity Model Certification (CMMC) Program – Part 2
Cybersecurity Maturity Model Certification (CMMC) 2.0 is a certification framework implemented by the US Department of Defence (DoD) to protect the information and ingenuity pertinent to the national security of the US used in the process and for the sake of...
Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 1
Over the next four Thursdays, SEQRED’s blog entries will be devoted to the topic of Smart Meter security in the wider context of the Smart Grid and the AMI architecture. We will present a synopsis of the AMI architecture conduct a vulnerability assessment of...
Cybersecurity Maturity Model Certification (CMMC) Program – Part 1
The Cybersecurity Maturity Model Certification (CMMC) Program is a certification program introduced by the U.S. Department of Defence to protect national security information in response to the increasingly frequent and complex cyberattacks on the Defence...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 8
TRITON malware was first identified during an attack on a Saudi Arabian petrochemical plant facility in the year 2017 and it targets Schneider Electric’s Triconex Tricon controllers. This was the first time in history that safety instrumented systems were...
Man in the Middle Attacks & Mitigation
What is a Man in the Middle attack? Man in the Middle attack is a type of cyber attack where an attacker intercepts and relays messages between two parties who believe they are communicating with each other. MITM attacks pose a serious threat to online...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 7
TRITON malware was first identified during an attack on a Saudi Arabian petrochemical plant facility in the year 2017 and it targets Schneider Electric’s Triconex Tricon controllers. This was the first time in history that safety instrumented systems were...
Denial of Service & Distributed Denial of Service Attacks & Mitigation
What is a denial-of-service attack? A denial of service (DoS) attack is designed to overwhelm the system's resources to the extent that it is unable to respond to legitimate service requests. Affected services may include email, websites, online banking, and...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 6
TRITON malware was first identified during an attack on a Saudi Arabian petrochemical plant facility in the year 2017 and it targets Schneider Electric’s Triconex Tricon controllers. This was the first time in history that safety instrumented systems were...