Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability


Destructive Petrochemical Plant cyberattack thwarted

No tags added.

Posted on 20 March, 2018 by Editor

The motivation behind this attack appears to be intentionally destructive   http://www.nytimes.com/2018/03/15/technology/saudi-arabia-hacks-cyberattacks.html

Cryptocurrency Malware Mining Attack on ICS systems

No tags added.

Posted on 12 February, 2018 by Editor

Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack   http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack

Triton malware targets Safety Instrumentation Systems (SIS)

No tags added.

Posted on 14 December, 2017 by Editor

New malware attacking Schneider Triconex SIS   https://www.wired.com/story/triton-malware-targets-industrial-safety-systems-in-the-middle-east/

Energy company plant engineers actively targeted

No tags added.

Posted on 8 July, 2017 by Editor

The FBI-DHS has issued an “amber” alert warning that energy companies have been actively targeted since May. (access the blog entry for the link)

Air-gap jumping attack tools

No tags added.

Posted on 28 June, 2017 by Editor

Brutal Kangaroo used by CIA to jump air-gaps (access the blog entry for the link)
  • Page 5 / 9
  • 3
  • 4
  • 5
  • 6
  • 7