Blog

Blog

Preparing for and detecting ransomware attacks in OT environments

It is increasingly the small and medium size businesses with OT environments that fall victim to ransomware attacks. The reason for this is that the SMEs often don’t consider themselves to be a potential attack target and as result downplay the importance of having a...
Cloud Computing – 2022 Top Threats – part 4

Cloud Computing – 2022 Top Threats – part 4

System Vulnerabilities  Cloud service platforms may have weaknesses, known as "system vulnerabilities," that could be taken advantage of by malicious actors. These vulnerabilities can pose a threat to the confidentiality, integrity, and accessibility of...

read more
Cloud Computing – 2022 Top Threats – part 3

Cloud Computing – 2022 Top Threats – part 3

Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such elements as: Cloud deployment models Cloud service models...

read more
Ransomware in Operational Technology Environments

Ransomware in Operational Technology Environments

Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the impacted companies don’t want the market to know they have...

read more
Cloud Computing – 2022 Top Threats – part 2

Cloud Computing – 2022 Top Threats – part 2

Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their valuable resources. These may include digital files, computer...

read more
Cloud Computing – 2022 Top Threats – part 1

Cloud Computing – 2022 Top Threats – part 1

Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud.  The report showed that the COVID-19 pandemic has shifted the cloud security landscape, with the focus now being on...

read more
Bring Your Own Device Security Strategies – Part 7

Bring Your Own Device Security Strategies – Part 7

In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves enrolling personal devices into a corporate system that grants the...

read more
Top 10 Emerging Cyber-Security Threats for 2030

Top 10 Emerging Cyber-Security Threats for 2030

As the world continues to become more and more digitally connected, cyber security threats are becoming an increasingly pressing issue. As a result, the European Union Agency for Network and Information Security (ENISA) has released a list of the top 10...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.