You are here

Cyber Security in the Maritime and Offshore Sector

With the increasing use of systems with embedded software on ships and mobile offshore platforms, cyber security is becoming critical not only for data protection, but...
CIS Controls - picture

Priority # 2– Manage Software on Your Network

Last year, we started exploring CIS Controls 1 -5 from CIS® ( Center for Internet Security® )*. CIS refers to these as ‘Foundational Cyber Hygiene’ -...
CIS Controls - picture

Priority # 1 – Manage Devices on Your Network

Over the coming weeks, we will explore CIS Controls 1 -5 from CIS® ( Center for Internet Security® )*. CIS refers to these as ‘Foundational Cyber...
Are you aware of the threats to your physical security system? - picture

Are you aware of the threats to your physical security system?

Have you asked yourself, “What are the Cybersecurity threats to my physical security system if an attacker gains access to it?”
Zenitel Cybersecurity Hardening Guide -  picture

Zenitel Cybersecurity Hardening Guide

Zenitel has developed a Cybersecurity Hardening Guide to help you approach your Cybersecurity planning, based on the CIS (Center for Internet Security) Controls. It combines our...
CIS Secursuite logo

Zenitel becomes a CIS SecureSuite Member

Zenitel renews commitment to implementing the best standard practices for its Internet Systems.