Blog

Blog

Enterprise Connected Devices - a cybersecurity challenge

Enterprise Connected Devices – a cyber security challenge – Part 2

Enterprise Connected Devices (ECDs) are all the devices that interact with, hold, or process an organisation’s data and can include end-user devices such as laptops and smartphones, physical devices connected to the Internet (IoT) such as cameras, and distinct ECDs...
The State of Global Operational Technology 2022 – part 3

The State of Global Operational Technology 2022 – part 3

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more
Karakurt Data Extortion Group

Karakurt Data Extortion Group

Just over three months ago, on June 1st, the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN) jointly issued a Cybersecurity Advisory on the Karakurt Team...

read more
The State of Global Operational Technology 2022 – part 2

The State of Global Operational Technology 2022 – part 2

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more
Paving the way for Post-Quantum Cryptography

Paving the way for Post-Quantum Cryptography

Two months ago, in early July, the US National Institute of Science and Technology (NIST) announced that the results of a six-year competition amongst the set of post-quantum algorithms had resulted in the selection of four initial algorithms (with the view...

read more
The State of Global Operational Technology 2022 – part 1

The State of Global Operational Technology 2022 – part 1

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more
Cybersecurity of Smart Buildings

Cybersecurity of Smart Buildings

When the topic of cybersecurity in Smart Buildings comes up, the question arises about the challenges related to the trend and technology, and who should be concerned about the topic. Building owners, investors, building managers, tenants, as well as...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.