![](https://cyberotsecure.com/wp-content/uploads/2023/11/DALL·E-2023-11-18-13.43.21-A-detailed-illustration-of-a-modern-car-showcasing-its-major-components-related-to-cybersecurity-as-specified-in-a-blog.-The-car-is-cutaway-to-reveal-1.png)
Next-Gen Auto Cyberdefenses: Navigating the Digital Highways of Connected Car Security
Introduction In the age of connected and autonomous vehicles, cybersecurity has emerged as a critical concern. Modern cars,...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/edr.jpg)
Detailed Analysis of Profinet Packet in the Automation Network
Upon analyzing the network’s data traffic for Profinet communication, I discovered various types of packets. In order to...
![](https://cyberotsecure.com/wp-content/uploads/2023/03/pexels-pixabay-270700-1024x325.jpg)
Why EDR is Essential for Industrial Control Systems ? Let’s see!
How does EDR works? Endpoint detection and response (EDR) works by continuously monitoring and analyzing endpoint activity to...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/nist.png)
NIST 800-82: Essential Guidelines for Industrial Control System Security
NIST 800-82 -Industrial Control System Guidelines NIST 800-82 is a publication from the National Institute of Standards and...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/pexels-victor-freitas-2261477-1024x502.jpg)
How to Better Train Your Automation Engineers on ISA/IEC 62443
The Colonial Pipeline attack exposed an ongoing problem facing the nation’s critical infrastructure: A gap in the cybersecurity workforce. Future...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/mitre-1024x365.jpg)
Common cyber attack tactics used by adversaries for ICS
Tactics represent the “why” of an ATT&CK technique or sub-technique. It is the adversary’s tactical goal: the reason...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/pexels-brett-sayles-2881227.jpg)
Major Cyber attack methods on an ethernet network switch
Some possible attack methods for ethernet switches are explained in this topic. These are quite common type of...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/monitoring-1024x513.jpg)
Securing Energy Infrastructure from Cyber Threats
Introduction Energy infrastructure is quite a large sector on Earth. It has evolved from the past 200 years...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/tolga-ulkan-9k36QqhA0cU-unsplash-1024x532.jpg)
Phases of ICS Cyber security Lifecycle from IEC 62443
Industrial Control System Cybersecurity Lifecycle The stages that a physical process or a management system goes through as...
![](https://cyberotsecure.com/wp-content/uploads/2023/01/1674678497973.jpg)
Method of High Level Risk Analysis from IEC 62443.
The implementation of IEC 62443 begins with a risk analysis. High level risk analysis is a step wise...