Become part of our team!
for a safer digital society
News & Blog
Telenet partnership with Toreon for Security Assessments
Every organisation is a potential target for hackers. The best way to discover and understand your security weaknesses, is to let an ethical hacker test them.
Our ethical hackers will perform a pentest (penetration test) on your infrastructure and applications to identify security weaknesses. The same tools and techniques of malicious attackers are used. However our goal is different. We discover the security weaknesses in order to mitigate them and create a more secure environment.
The road to becoming an ICS Security Specialist
A while ago I was giving a guest lecture on ICS Security. One of the students asked me ‘How do you begin with ICS/OT Security?’. I realized that the road to becoming an ICS Security Specialist could use some clarification. Let me give you some insight on some of the requirements and your potential career path.
IT to OT to IT to OT
There are several differences between the tasks and responsibilities of both environments. Which means they have other priorities and concerns. Either ways, you need to have the knowledge, combined with the good attitude and mindset.