
Case Studies
Building Automation cybersecurity for Leipzig data center campus
At the enviaTel data center, Rhebo's network monitoring continuously monitors the communication within the building automation, which ensures the reliable operation of the servers, from the locking system to the fire protection. The telecommunications service provider's cybersecurity team shares first-hand insights into their use of the network intrusion detection system.

OT-Threats
TOP 10 Anomalies in OT Networks | #03
Rarely visible to OT operators, but always a cause for concern: atypical communication changes in OT networks can indicate anything from network disruptions to malicious behavior or legit maintenance personnel activities. We explain what can be seen with OT monitoring and how to separate the wheat from the chaff.

OT-Threats
TOP 10 Anomalies in OT Networks | #02
Vulnerable operating systems and software can be found in almost all industrial infrastructures. From Windows 95 to outdated libraries and firmware riddled with vulnerabilities, we have seen it all during Rhebo Industrial Security Assessments. We explain what the results imply and why it is important in OT.

OT-Threats
TOP 10 Anomalies in OT Networks | #01
In this video, we explain how the misconfiguration of network protocols can create an open flank in OT networks. The focus of this video and the Rhebo Industrial Security Assessment findings: DHCP and ICMP communication, which can become security-relevant for the operation of industrial facilities.

IEC61850
IEC624434
IIoT & Grid-Edge
ITSIG-2.0
NIS2
Rhebo Explained: How anomaly detection works
The answer to all your questions: How does OT security monitoring with anomaly detection work? What must a network intrusion detection systems for industrial networks provide? And how do you manage to establish OT security even with a small team and in face of the prevailing OT security skills gap? Get your answers in under 3 minutes!

IEC61850
IEC 61850 Series: »How does the scd file accelerate establishing cybersecurity?«
Can we automate the training of our anomaly detection in IEC 61850 infrastructures? Yes, and it's actually quite easy. With the.scd file, which acts as a digital twin of the infrastructure within the framework of the standard, the baseline for effective OT security monitoring is already available. We provide a brief explanation of how this works.

IEC61850
IEC 61850 Series: »How can MMS be used to attack IEC 61850 infrastructures?«
One of the most common protocols in (not only) IEC 61850 infrastructures is MMS (Manufacturing Message Specification). Unfortunately, the protocol can also be manipulated in a variety of ways. In this video, you will learn how this is possible and how it can affect the operation of critical infrastructure systems.

IEC61850
IEC 61850 Series: »What are typical attack vectors in IEC 61850 infrastructures?«
IEC 61850 infrastructures are rarely isolated, because the goal is to network different systems across different locations. This opens the floodgates to various attack vectors – from direct access via network components to supply chain compromise. We outline the threats and show where attackers can gain access.

IEC61850
IEC 61850 Series: »How secure is the IEC 61850 standard?«
The IEC 61850 standard ensures compatibility in data communication between different utility systems and grids. But what about cybersecurity? Has the security of the protocols and guidance been considered? The short answer is no. Find out what this means for you in this video.

IEC61850
IEC 61850 Series: »What does the IEC 61850 standard define?«
How does the IEC 61850 standard achieve interoperability in utility automation systems? What exactly is defined to ensure communication between different devices with different protocols? A brief overview of the most important aspects of the international standard.

IEC61850
IEC 61850 Series: »Why is the IEC 61850 standard important?«
For utilities, the IEC 61850 standard is one of the most important standards for ensuring seamless communication between different networks, systems and locations. The keyword here is interoperability. In this video, we explain in a nutshell why no modern utility can afford to ignore this standard.