info@dts-solution.com

+971 43383365

  • F
  • L
  • I

Have any Questions?

+971 43383365

info@dts-solution.com

Network & Cyber Security Solutions & Services, Penetration Testing in Dubai Abu Dhabi UAE Saudi GCC
  • Company
    • About Us
    • Management Team
    • Vision
    • Careers
  • Solutions
    • Security Solutions

      Network Security
      Network
      Security



    • Data
      Security



    • Infrastructure Security



    • System
      Security



    • Application Security



    • Mobility
      Wireless



    • Compliance Monitoring



    • Advance Threat Protection
    • Industry



      Enterprise Security




    • Telecom
      Security




    • Cloud
      Security




    • SCADA
      Security
    • Business Needs



      Security Operations Center




    • Data Center
      Security




    • Software Defined Security




    • Managed Security Service Provider
  • Services
    • Cyber Strategy
      • Cyber Risk Management
      • Security Regulatory and Compliance
        ISO27001:2013 | NESA | DISR | PCI-DSS
      • Cyber Transformation
      • Cyber Security Strategy
      • Cyber Risk Maturity Assessment
      • Executive Cyber Dashboard
      • Cyber Security Metrics
      • Education, Training & Awareness
    • Cyber Secure
      • Red Team – Offensive
        Vulnerability Assessment | Penetration Testing | Web Application | Mobile Application | Wireless Security Testing | Social Engineering | Red Teaming Exercises
      • Blue Team – Defensive
        Infrastructure Protection | Network Security Protection | System Security Protection | Endpoint Security Protection | Application Security Protection | Vulnerability Management | Security Operations Center | Cloud Security Protection
      • White Team – Advisory
        Identity and Access Management | Data Protection Program | Cloud Security Assessment | Security Architecture | Data Center Design and Blueprint
    • CYBER OPERATIONS
      • HAWKEYE – SOC As A Service
      • CSOC Design and Build
      • CSOC Governance
      • CSOC Technology
      • Surface Attack Analysis
      • Cyber Threat Intelligence
      • Purple Team – Detective
        Threat Modeling | SIEM Effectiveness Analysis | Use Case Development | Cyber Attack Kill Chain | Threat Adversary Simulation
    • CYBER RESPONSE
      • IR Program
      • IR Playbooks and TTPs
      • IR Preparation
      • Pre-and-Post Compromise Assessment
      • Digital Forensics
    • CYBER RESILIENCE
      • Cyber Resilience Assessment
      • Red Teaming – Offensive
      • Purple Teaming Response
      • Cyber War-Gaming
  • Vendors
    • Fortinet

      Fortinet

    • Paloalto

      Palo Alto

    • Logrhythm

      Logrhythm

    • Arbor

      Arbor

    • Tenable

      Tenable

    • Lastline

      Lastline

    • Qualys

      Qualys

    • Certes

      Certes

    • Forescout

      Forescout

    • Infoblox

      Infoblox

    • Digital Guardian

      Digital Guardian

    • Boldon James

      Boldon James

    • Thycotic

      Thycotic

    • Nozomi Networks

      Nozomi Networks

    • Elastic

      Elastic

    • SecurityScorecard

      SecurityScorecard

    • Recorded Future

      Recorded Future

    • Knowbe4

      Knowbe4

    • Axonius

      Axonius

    • ExtraHop

      ExtraHop

    • Systancia

      Systancia

  • Press Center
  • Products



    • NESA Compliance

      NESA Toolkit Solutions




    • DISR Compliance

      DISR Toolkit Solutions




    • Firewall Policy Builder

      Firewall Policy Builder

  • Contact

OT Security

  • Home /
  • Press Center /
  • OT Security
ICS MITRE ATTACK Techniques

ICS MITRE ATT&CK Technique

Read more
June 4, 2020
Comments off
Industrial Control Security IoT Security OT Security
OT Vs. IT Security

OT vs. IT Cybersecurity 101

Read more
April 29, 2020
Comments off
Cyber Security IoT Security OT Security

© 2021 DTS Solution. All Rights Reserved.

Newsletter

Recent News

  • SOC Features and Use Cases
    SOAR Features and Use Cases

    January 10, 2021 | Comments off

  • Dark Web and Threat Intelligence
    Dark Web and Threat Intelligence (DARKINT)

    December 31, 2020 | Comments off

  • Ransomware Incident Response Plan - Part 2
    Ransomware Incident Response Plan – Part 2

    December 23, 2020 | Comments off

  • Dubai Police 2019 CTF
    Dubai Police 2019 CTF Walkthrough

    December 22, 2020 | Comments off

About Our Company

We are committed to providing your enterprise with best in-class cyber security consulting services helping you protect your critical assets.

We are an organization that is purely focused on assisting your business to mitigate risks that does not comprise business activities by ...

Read more →
Tweets by @DTS_Solution

Tags

  • Application Security
  • APT Solutions
  • Arbor
  • Awards
  • Azure Security
  • Cloud Security
  • Company
  • Conference
  • CrypoFlow
  • Cyber Security
  • Cyber Security Compliance
  • Cyber Threat Management
  • Data Center Security
  • Data Loss Prevention
  • Data Security
  • DDOS Mitigation
  • Email Security
  • Firewall Security
  • Fortigate
  • Fortinet

Interesting Links

  • System Security
  • Telecom Security
  • Advance Threat Protection
  • Application Security
  • Cloud Security
  • Data Security
  • Data Center Security
  • Enterprise Security
  • Industrial Control Security
  • Infrastructure Security
  • Mobility Security
  • Managed Security Service Provider
  • Network Security

Security Updates

US Postal Service gets a military tank-maker to create ‘ugly’ new delivery EVs
US Postal Service gets a military tank-maker to create ‘ugly’ new delivery EVs

Yeah, you read that headline correctly. Even though it seems to make absolutely no sense, it’s 2021 and the world is on fire, so let’s see what’s happening. The United States Postal Service announced yesterday that it has signed, sealed, and delivered a 10-year-long, multi-billion dollar contract to Oshkosh Defense… [...]

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal data from the airplane maker Bombardier and leak data on the site operated by the Clop ransomware gang. The wave… [...]

Microbes grown on Mars’ ruddy crust hint at signs of life
Microbes grown on Mars’ ruddy crust hint at signs of life

Billions of years ago, Mars was home to oceans, rivers, and seas. During this ancient era of the Red Planet, atmospheric pressures and temperatures were higher than today, making Mars a far more temperate world than the one we know in our modern age. Today, we search for signs of any… [...]

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now
Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure management platform that may allow attackers to execute arbitrary commands and take control of affected systems. "A malicious actor with network access to port 443 may exploit this issue to execute commands… [...]

Experts Find a Way to Learn What You're Typing During Video Calls
Experts Find a Way to Learn What You're Typing During Video Calls

A new attack framework aims to infer keystrokes typed by a target user at the opposite end of a video conference call by simply leveraging the video feed to correlate observable body movements to the text being typed. The research was undertaken by Mohd Sabra, and Murtuza Jadliwala from the… [...]

Firefox 86 introduces ‘total cookie protection’ — should you care?
Firefox 86 introduces ‘total cookie protection’ — should you care?

Mozilla is now rolling out Firefox 86 for desktop — Macs, Windows, and Linux systems. The browser update brings features such as multiple picture-in-picture mode, and forward and rewind controls in video playback. While these features are nice, Firefox 86 also brings total cookie protection, and that’s very important for your… [...]

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of industry sectors had to embrace technology, video conferencing and new communication tools within a very short space… [...]

Third-party risk management programs still largely a checkbox exercise

Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these TPRM programs only provide a thin veneer of cybersecurity assurance. Recent data indicates that they are inconsistent (at best) when it comes to… [...]

Before you pay for Spotify HiFi, try to pass this lossless audio test
Before you pay for Spotify HiFi, try to pass this lossless audio test

Spotify yesterday announced a ‘HiFi’ upgrade tier for its streaming service that provides lossless audio, promising music free of compression artefacts. Although it won’t be available until later this year, Spotify HiFi promises “CD-quality” audio and aims to steer audiophiles away from other lossless streaming competition like Tidal and Deezer. But… [...]

U.S. municipalities are the perfect target for cybercriminals in 2021

On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 parts per million to 11,100. Thanks to the physical fail-safes and alarm systems put in place by the… [...]

Most businesses see state-sponsored cyberattacks as a major threat

A majority of businesses surveyed for a study by the Economist Intelligence Unit (EIU) and the Cybersecurity Tech Accord, see state-led and sponsored cyberattacks as a major threat. They are concerned about catastrophic reputational and financial consequences and call for greater international political cooperation to mitigate these threats. The survey… [...]

Researchers propose more secure and private mobile contact tracing

For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be more transmissible. The need for widespread contact tracing at the start of the pandemic led tech giants Apple and Google to announce a… [...]

Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

The digitalization of services and expansion of remote working has heightened the number of off-premises users accessing cloud-based resources from their mobile device. In this configuration, each mobile device represents a point of entry for hackers, spies and cyberactivists. To secure information, it is critical to have an endpoint security… [...]

New Firefox Feature Ups the Ante Against Cookie-Based Tracking
New Firefox Feature Ups the Ante Against Cookie-Based Tracking

Mozilla this week announced improved user privacy in Firefox 86, with the introduction of a new feature aimed at preventing the tracking of users from site to site. read more [...]

New Firefox Feature Ups the Ante Against Cookie-Based Tracking
New Firefox Feature Ups the Ante Against Cookie-Based Tracking

Mozilla this week announced improved user privacy in Firefox 86, with the introduction of a new feature aimed at preventing the tracking of users from site to site. read more [...]

  • Home
  • Company
  • Data Sheets
  • Press Center
© Copyrights 2021. All rights reserved by DTS Solution - Cyber Security Redefined