Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability


ICS Honeypots targeted by criminal hackers

No tags added.

Posted on 21 August, 2018 by Editor

Is this the new type of ransomware attack?  This honeypot was actively targeted by what appears to be criminal organization.   Cybercriminals waste no time breaking into experimental honeypot...  

Destructive Petrochemical Plant cyberattack thwarted

No tags added.

Posted on 20 March, 2018 by Editor

The motivation behind this attack appears to be intentionally destructive   http://www.nytimes.com/2018/03/15/technology/saudi-arabia-hacks-cyberattacks.html

Cryptocurrency Malware Mining Attack on ICS systems

No tags added.

Posted on 12 February, 2018 by Editor

Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack   http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack

Triton malware targets Safety Instrumentation Systems (SIS)

No tags added.

Posted on 14 December, 2017 by Editor

New malware attacking Schneider Triconex SIS   https://www.wired.com/story/triton-malware-targets-industrial-safety-systems-in-the-middle-east/

Energy company plant engineers actively targeted

No tags added.

Posted on 8 July, 2017 by Editor

The FBI-DHS has issued an “amber” alert warning that energy companies have been actively targeted since May. (access the blog entry for the link)
  • Page 5 / 9
  • 3
  • 4
  • 5
  • 6
  • 7