Cybersecurity Solutions

To Protect Industrial Ecosystems (ICS/OT)

We assist organizations measure and manage cybersecurity risk, identify and remediate cybersecurity weaknesses, make the right cybersecurity technology investment decisions, build resilience to prepare for and respond to cybersecurity incidents.

Assessment and Testing

Measure and manage risk, identify critical assets, increase compliance with our risk assessment, penetration testing, gap assessment services.

Policy Guidance and Architecture

Improve processes with NIST & IEC standards based cybersecurity policies; and establish secure architecture.

Awareness Training

Enable and empower your employees to protect your infrastructure with carefully curated cybersecurity awareness program.

Our Track Record

Risk Assessment

Secure Design

Penetration Test

We help you transform your security posture

To protect from evolving cyber threats

Delivering Solutions with Lasting Value

We serve a wide range of industries. Our industry knowledge and experience will enable you to effectively deal with cyber threats.

Oil & Gas

Manufacturing

Mining

Chemical

Transportation

Utilities

Water

Government

3waysecure Approach

Our approach is simple. We help you adopt holistic, pragmatic and sustainable security with fact- and intelligence-based strategic decisions

Holistic, Pragmatic, Sustainable Security

Security must be holistic, pragmatic and sustainable to protect from evolving threats.

Information And Intelligence-led Decisions

Intelligence-led and information based approach empowers strategic decision making.

Personalized And Cost Effective Solutions

Solving problems unique to your business with personalized and cost-effective solutions.

Critical Vulnerabilities

SweynTooth Vulnerabilities

Severity: Critical

Summary

The vulnerability family titled SweynTooth is a collection of 12 vulnerabilities with the potential for more to be identified and released. These vulnerabilities are reported to affect at least seven different BLE SoC manufacturers utilizing various affected software development kits (SDK). According to information released by the researchers, the BLE SoC manufacturers include Texas Instruments, NXP Semiconductors, Cypress, Dialog Semiconductors, Microchip, STMicroelectronics, and Telink Semiconductor. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes, buffer overflows, or the complete bypass of security.

Affected Assets:

It is reported that smart-home devices, wearables, environmental tracking or sensing devices, and several medical and logistics products could be affected. The affected medical devices may include pacemakers, blood glucose monitors, and others using affected BLE SDKs.

Vulnerabilities in complex

Manufacturers affected

%

Chance of being affected

Mitigation Steps:

The BLE SoC manufacturers reported to use affected software development kits (SDK) have issued the following user notifications or provided the following patches for device manufacturers. Additional notifications and patches are pending and will be updated as they become available.

Get A Free Consultation

Learn more about our services and solutions to protect your business.