Blog
Blog
Cybersecurity Framework – Protect – part 1
Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks....
How to #StopRansomware – Prevention & Mitigation best practice – part 3
In this How to #StopRansowmare mini-series, last week we covered the areas of General Best Practices and Hardening Guidance. Today we continue with Ransomware and Data Extortion Response Checklist Should your organization be a victim of ransomware, follow...
Cybersecurity Framework – Identify
Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks....
How to #StopRansomware – Prevention & Mitigation best practice – part 2
In this How to #StopRansowmare mini-series, last week we covered the areas of Preparing for Ransomware & Data Extortion Incidents as well as best practices for prevention categorized based on the typical entry points used. Today we continue with General...
Threat Sources, Vulnerabilities, and Incidents – part 3
System Vulnerabilities and Predisposing Conditions The weaknesses present in a system can originate from its hardware, firmware, and software elements. These vulnerabilities can result from various factors such as design deficiencies, development errors,...
How to #StopRansomware – Prevention & Mitigation best practice – part 1
Just three weeks ago, we released an article highlighting the current trends in the ransomware industry, revealing a steady increase in the number of ransomware incidents over the past few years. Merely five days ago, the BBC reported yet another ransomware...
Threat Sources, Vulnerabilities, and Incidents – part 2
System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and capability. On the smaller end, a system could refer to an individual...
VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures
On the 23rd of May CISA, with a number of other Cyber Security agencies, issued a joint Cybersecurity advisory to highlight a recently discovered cluster of activity of interest associated with a People’s Republic of China (PRC) state-sponsored cyber actor,...
Threat Sources, Vulnerabilities, and Incidents – part 1
Several terms are used to describe the inter-related concepts of threat, threat source, threat event, and incident. A threat is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image,...
The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem
The Russia-Ukraine conflict, which began in 2014, has had a profound impact on various aspects of society. One such area significantly affected is the global cybercrime ecosystem. The conflict has not only intensified cyber operations between the two nations...