Author: cp
-
Best practices for protecting OT systems.
Operational Technology (OT) security is gaining visibility as industry starts to understand the threat to its processes, so we thought we would post some ideas on best practice. OT systems are an essential part of modern industry, and their security is critical to prevent disruptions to operations, theft of sensitive information, damage to equipment or […]
-
CyberPrism signs the Armed Forces Covenant
We are delighted to announce that we have signed the Armed Forces Covenant, pledging to support recognition and employment of members of the Regular and Reserve Forces. Many of us are former members of the Armed Forces, and we recognise the knowledge and experience that a Services background can bring to an organisation, especially one […]
-
Dan Ballin joins CyberPrism’s Board
We are delighted to announce that Dan Ballin has joined the Board of CyberPrism as a Senior Board Advisor. Dan is the founder of Ideas Crucible, and has a fantastic track record in supporting growth and innovation, having helped win more than £1 billion worth of profitable revenue for new businesses. His background in AI, […]
-
Artificial Intelligence Applied to Cyber Modelling
Nick McLauchlan, our CTO, was at NATO’s MSG-179 Symposium on Emerging and Disruptive Modelling and Simulation Technologies with QinetiQ’s George Skrobanski, presenting their paper on Artificial Intelligence Applied to Cyber Modelling, based on the work they have done for DSTL. In the modern military domain, timely information is increasingly critical. However, attacks are becoming more […]
-
Thought piece – Has the time come to consider using a new CIA triad for Operational Technology?
Ask any IT professional about information security and most will probably mention the CIA triad of Confidentiality, Integrity and Availability. The CIA triad is widely accepted as fundamental to an organisation’s information security practice. Simply put, Confidentiality is about protecting your data from unauthorised viewing or access. Integrity means that your data is protected, reliable […]
-
CyberPrism has successfully gained JOSCAR Supplier Accreditation
The JOSCAR Registration Mark is highly valued amongst some of the largest businesses in the aerospace, defence and security industry. The platform is a single repository for pre-qualification and compliance information. Dane Clackworthy, Head of Sales said: “We wanted to demonstrate our commitment and credentials to the Security industry. By receiving JOSCAR accreditation, CyberPrism have […]
-
Updated ProcessGuard Oil and Gas Historian Data Protection Use Case
We have updated our ProcessGuard Oil and Gas Historian Data Protection Use Case. ProcessGuard will ensure the safe and continuous operation of offshore platforms and will guard the integrity and confidentiality of the historian data flow. It will prevent the ingress of malware from connected IT networks and will alert the IACS Responsible Person of any […]
-
CyberPrism Joins the Aberdeen & Grampian Chamber of Commerce (AGCC)
CyberPrism has joined the Aberdeen & Grampian Chamber of Commerce (AGCC) to forge closer ties to the region. The AGCC, which represents more than 1,100 organisations collectively employing 125,000 people across all sectors, has done an amazing job supporting members and shaping a strong future economy. Dane Clackworthy, Head of Sales and Business Development, said: […]
-
Updated ProcessGuard Medical Legacy Device Close Protection Use Case
We have updated our ProcessGuard Medical Legacy Device Close Protection Use Case. Many items of legacy equipment in the Operational Technology (OT) Domain, such as medical scanners, can no longer be patched. This obliges the operator to either replace the equipment or accept the cyber risk. Process Guard protects individual devices and will allow them to run to […]
-
ShipGuard Use Case Updated
We have updated our ShipGuard Use Case. ShipGuard offers wide applicability across the maritime industry, protecting vessels from cyber-attack, managing network and communications traffic, and controlling access to networks by third parties such as maintenance engineers. This short document provides information on the services we include, the benefits and how it is deployed. Click here to view the updated Use […]