The IoT / OT challenge
How to secure your OT/IoT environment? SecureLink CTO Wim De Smet gives some clear tips.
How to secure your OT/IoT environment? SecureLink CTO Wim De Smet gives some clear tips.
According to the RightScale State of the Cloud Report, 96% of organizations already opted for the Cloud. 77% of those cloud users still worry about its security. It is essential to keep in mind that the Cloud provider is only responsible for the security of the underlying platform. Your organization needs to take care of your data and access rights. Here are some tips:
SecureLink Göteborg håller i flera event denna vår med fokus på olika it säkerhets områden.
As a force of habit, we run a default ‘checklist’ to test for privilege escalation. Recently we did an assessment of a workstation and we ran through the checklist finding two services with an unquoted service path. Since we had already physical access, and of course the disk was unencrypted, this vulnerability could be exploited to gain ‘NT AUTHORITY\SYSTEM’ rights.
Victor Rosberg is set to present IT Operations and Analytics
A busy start of the year: Emotet, Tickbot, Ryuk, RCE in APT/APT-get, and 36-year-old vulnerabilities.
In the first 10 months of 2018, SecureLink Cyber Defense Centers have digested just south of a quarter of a million security events. These events were triggered from various security solutions and logs, and then processed and digested by our detection and response platforms. What we found surprised us, and we want to share it with you.
In 2018, companies under 1000 people experiences 5 times more incidents per person. SecureLink has summarised this and other developments in its Annual Security Report.
SecureLink is once again recognized as a leading European provider of cyber security services. A new report from Gartner ranks SecureLink as a top provider in the segment Managed Detection and Response (MDR).