{"id":34855,"date":"2025-10-13T15:58:49","date_gmt":"2025-10-13T06:58:49","guid":{"rendered":"https:\/\/www.seculayer.com\/?page_id=34855"},"modified":"2025-10-13T16:05:04","modified_gmt":"2025-10-13T07:05:04","slug":"critical_infrastructure","status":"publish","type":"page","link":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/","title":{"rendered":"Critical Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"34855\" class=\"elementor elementor-34855\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0ea86ee elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"0ea86ee\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7dcfb57 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"7dcfb57\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbc50b7 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"dbc50b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.0 - 08-08-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h1>Cybersecurity for Critical Infrastructure<\/h1><h6>Cyberattacks on critical infrastructure can have devasting effects and disrupt main functionalities of a modern society. To secure robustness, SCADA (Supervisory Control and Data Acquisition) \u2013 a control system architecture is designed to secure the infrastructure against being compromised. However, these networks are susceptible to disruption of services, redirection and manipulation of operational data.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d12ef01 sc_fly_static elementor-widget elementor-widget-button\" data-id=\"d12ef01\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a Demo<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-65d67f0 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"65d67f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6113159 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"6113159\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8615704 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"8615704\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae3af52 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"ae3af52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 style=\"text-align: center;\">Ensure NIS2 compliance with Logpoint<\/h2><h6>NIS2 Directive is stepping into force, striving to enhance protection of critical infrastructure in EU from cyberthreats. It introduces stricter security demands, reporting obligations and enforcement requirements for a broader scope of sectors. Inability to comply can impose fines up to 2%* of the worldwide turnover.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e298487 elementor-align-center sc_fly_static elementor-widget elementor-widget-button\" data-id=\"e298487\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more about NIS2<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dc01ba1 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"dc01ba1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-444e7f0 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"444e7f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bb6e57b elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"bb6e57b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5003b82 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"5003b82\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fa029ac sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"fa029ac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b4f1a95 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"b4f1a95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5>WHY LOGPOINT:<\/h5><h2>Holistic Security of Your Critical Infrastructure<\/h2><h6>Highly targeted attacks in complex SCADA networks require advanced event monitoring from both the SCADA system and general IT infrastructure. This includes ERP systems, such as SAP, which are often in place in critical infrastructure environments.<\/h6><h6>With a unified security and observability solution, Logpoint delivers real-time, holistic monitoring across your entire infrastructure. Get alerted when a suspicious pattern arises\u00a0and keep track of all incidents in one view with intuitive dashboards. Logpoint is ideal for investigating threats, enabling proactive cybersecurity response, and providing a platform for ensuring compliance with industry standards.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722076c sc_fly_static elementor-widget elementor-widget-button\" data-id=\"722076c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e8caaf9 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"e8caaf9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c46524d sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"c46524d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6758c49 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"6758c49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5>WHY LOGPOINT:<\/h5><h2>Identify and Respond to Incidents Faster<\/h2><h6>Dynamic lists collect and store event-specific values and allow for dynamic updates. By enabling analysts to define dynamic lists and tables, organizations can reduce the time to detect and respond to incidents faster. By combining dynamic lists with static enrichment, we empower our customers to build self-configuring analytics to automatically react to new observations accelerating response and MTTR.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e1254a5 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"e1254a5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f8c94ab elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"f8c94ab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d5851a sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"4d5851a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-23f2752 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"23f2752\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fafaf32 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"fafaf32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5>WHY LOGPOINT:<\/h5><h2>Authentication and Transmission Control<\/h2><h6>To make audits of transmission controls easier, Logpoint can detect activities such as email, https, and VPN communications. Authentication and transmission control for data security is enforced to ensure a proper authentication mechanism for user identity. Similarly, for transmission controls, Logpoint utilizes secure communication channels for interaction between an external object and a Logpoint instance or between multiple Logpoint instances.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23b0ca3 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"23b0ca3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e35db94 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"e35db94\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ee90706 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"ee90706\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b7de869 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"b7de869\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a8826b sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"0a8826b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2>Spotting and Tracking Unauthorized Network or Systems Access<\/h2><h6>Logpoint enables you to detect any suspicious and\/or unauthorized network behavior such as connection attempts on closed ports, blocked internal connections, connections made to known-bad destinations, requests initiated from untrusted zones, suspicious system access and many more.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38eff9d sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"38eff9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa4e079 elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"aa4e079\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59f4c33 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"59f4c33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f480aeb elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"f480aeb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-546bed4 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"546bed4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59a5db9 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"59a5db9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5>Use Case:<\/h5><h2>Logpoint for Computerome<\/h2><h6>Computerome is one of Scandinavia\u2019s largest High-Performance Computing (HPC) clusters dedicated to life science research. Keeping a tight check on big data and meticulously documenting how users access information is a regulatory requirement. To ensure the highest security level and compliance, Computernome has chosen Logpoint\u2019s SIEM solution.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b215bd sc_fly_static elementor-widget elementor-widget-button\" data-id=\"8b215bd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">See The Use Case<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-04cdfd1 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"04cdfd1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-6da3c03 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"6da3c03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h6 style=\"text-align: center;\">Logpoint allows Computerome administrators to quickly detect unusual behavior in the system and to prevent misuse and data breaches. It provides that extra layer of security on top of the established security controls, which is required when handling vast amounts of data. It also allows us to provide our users with full insight and transparency.<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f59cfb sc_fly_static elementor-widget elementor-widget-image\" data-id=\"7f59cfb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.0 - 08-08-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c62c6bb sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"c62c6bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Peter L\u00f8ngreen,<\/h4><h4 style=\"text-align: center;\">National Life Science Supercomputing Center<\/h4>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c24467b elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"c24467b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b420242 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"b420242\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98f463d sc_fly_static elementor-widget elementor-widget-heading\" data-id=\"98f463d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.0 - 08-08-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Get up to date with the Logpoint blog!<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f7951b elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"5f7951b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fe40c77 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"fe40c77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9d0f427 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"9d0f427\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dd9cc77 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"dd9cc77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-16ced4a elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"16ced4a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1eefb1a sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"1eefb1a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8327251 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"8327251\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card_box \"><div class=\"card_content\"><h4 class=\"recent-post-title\" style=\"text-align: left;\"><a href=\"https:\/\/logpoint.com\/en\/blog\/xworm-rat-analysis-steal-persist-control?hsLang=en\">XWorm RAT analysis: Steal,\u2028 persist &amp; control<\/a><\/h4><h6 class=\"item_descr\" style=\"text-align: center;\">XWorm is a stealthy remote access tool that often arrives in an ordinary message and can end in\u2026<\/h6><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-222b637 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"222b637\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c767e5 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"8c767e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card_box \"><div class=\"card_content\"><h4 class=\"recent-post-title\"><a href=\"https:\/\/logpoint.com\/en\/blog\/why-cyber-sovereignty-matters-in-todays-threat-landscape?hsLang=en\">Why cyber sovereignty matters in today\u2019s threat landscape<\/a><\/h4><h6 class=\"item_descr\">Europe is in the middle of a geopolitical storm. Sabotage of undersea cables disrupts global\u2026<\/h6><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-93079e7 sc_inner_width_none sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"93079e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dfc90f8 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"dfc90f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 class=\"recent-post-title\"><a href=\"https:\/\/logpoint.com\/en\/blog\/citrix-vulnerabilities-rising-when-gateways-give-way?hsLang=en\">Citrix Vulnerabilities Rising \u2013 When Gateways Give Way<\/a><\/h4><h6 class=\"item_descr\">Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and NetScaler\u2026<\/h6>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b4c88e elementor-align-center sc_fly_static elementor-widget elementor-widget-button\" data-id=\"3b4c88e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity for Critical Infrastructure Cyberattacks on critical infrastructure can have devasting effects and disrupt main functionalities of a modern society. To secure robustness, SCADA (Supervisory Control and Data Acquisition) \u2013&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity for Critical Infrastructure Cyberattacks on critical infrastructure can have devasting effects and disrupt main functionalities of a modern society. To secure robustness, SCADA (Supervisory Control and Data Acquisition) \u2013&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"\ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/seculayer\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T07:05:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.seculayer.com\/en\/#website\",\"url\":\"https:\/\/www.seculayer.com\/en\/\",\"name\":\"\ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer\",\"description\":\"No1. SIEM, SOAR, AI\ud50c\ub7ab\ud3fc, \ud1b5\ud569\ubcf4\uc548\uc194\ub8e8\uc158 \ubca4\ub354\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.seculayer.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\",\"contentUrl\":\"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#webpage\",\"url\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/\",\"name\":\"Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer\",\"isPartOf\":{\"@id\":\"https:\/\/www.seculayer.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#primaryimage\"},\"datePublished\":\"2025-10-13T06:58:49+00:00\",\"dateModified\":\"2025-10-13T07:05:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.seculayer.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Infrastructure\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer","og_description":"Cybersecurity for Critical Infrastructure Cyberattacks on critical infrastructure can have devasting effects and disrupt main functionalities of a modern society. To secure robustness, SCADA (Supervisory Control and Data Acquisition) \u2013&hellip;","og_url":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/","og_site_name":"\ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer","article_publisher":"https:\/\/www.facebook.com\/seculayer","article_modified_time":"2025-10-13T07:05:04+00:00","og_image":[{"url":"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.seculayer.com\/en\/#website","url":"https:\/\/www.seculayer.com\/en\/","name":"\ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer","description":"No1. SIEM, SOAR, AI\ud50c\ub7ab\ud3fc, \ud1b5\ud569\ubcf4\uc548\uc194\ub8e8\uc158 \ubca4\ub354","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seculayer.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png","contentUrl":"https:\/\/www.seculayer.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png"},{"@type":"WebPage","@id":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#webpage","url":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/","name":"Critical Infrastructure - \ubcf4\uc548\uad00\uc81c \uc194\ub8e8\uc158\uc758 \ub9ac\ub354 SecuLayer","isPartOf":{"@id":"https:\/\/www.seculayer.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#primaryimage"},"datePublished":"2025-10-13T06:58:49+00:00","dateModified":"2025-10-13T07:05:04+00:00","breadcrumb":{"@id":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seculayer.com\/en\/critical_infrastructure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.seculayer.com\/en\/critical_infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seculayer.com\/en\/"},{"@type":"ListItem","position":2,"name":"Critical Infrastructure"}]}]}},"_links":{"self":[{"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/pages\/34855"}],"collection":[{"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/comments?post=34855"}],"version-history":[{"count":4,"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/pages\/34855\/revisions"}],"predecessor-version":[{"id":34860,"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/pages\/34855\/revisions\/34860"}],"wp:attachment":[{"href":"https:\/\/www.seculayer.com\/en\/wp-json\/wp\/v2\/media?parent=34855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}