TIOZ Howest

Howest Logo

Projects about
#ICIL4

Example project image

Proeftuin ICIL4.0

The Living Lab ICI4.0 has taught us that a translation of a legal text of a regulation such as the NIS should proceed in 2 phases namely we need to provide a management / business approach (provided budget) with the focus what does it bring to the business and a technology approach (use budget).

News about
#ICIL4

Example project image

Behind the Hack: the Unlocked Storage Container

A public dirt road led us straight to an unlocked storage container. Once inside, we plugged in a computer, scanned the network, found a PLC and rebooted it. This stopping a crane without any alerts. No passwords, no monitoring, no barriers.

Example project image

Behind the Hack: How Audio Visual Equipment like ClickShare became a Hacker's Gateway

In a recent ethical hacking test, we gained full access to a company’s internal network... by simply plugging our laptop into their ClickShare assigned Ethernet port in one of their conference rooms. Your weakest link may be hiding behind your projector.

Example project image

Behind the Hack: the Conference Room Laptop

This is the story of a public guest laptop in a conference room where they offered hands-on product demos. It became the gateway for a full-scale corporate breach by our ethical hackers. The servers were secured. Employees used strong passwords. The network had a firewall. Still, we hacked their internal network.