Blog

Blog

Threat Sources, Vulnerabilities, and Incidents – part 2

System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and capability. On the smaller end, a system could refer to an individual hardware or...
Threat Sources, Vulnerabilities, and Incidents – part 2

Threat Sources, Vulnerabilities, and Incidents – part 2

System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and capability. On the smaller end, a system could refer to an individual...

read more
Threat Sources, Vulnerabilities, and Incidents – part 1

Threat Sources, Vulnerabilities, and Incidents – part 1

Several terms are used to describe the inter-related concepts of threat, threat source, threat event, and incident. A threat is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image,...

read more
Distributed Control Systems Defense in Depth Implementation

Distributed Control Systems Defense in Depth Implementation

The application of a defense-in-depth strategy is highly beneficial in OT (Operational Technology) environments as it allows for a concentrated focus on safeguarding critical functions. The principles of defense-in-depth are adaptable and can be effectively...

read more
Ransomware Trends

Ransomware Trends

Imposing cost on ransomware threat actors During the years 2021 and 2022, numerous governments recognized the significance of ransomware as a major threat to national security. In response, they implemented a range of measures, encompassing both legal and...

read more
SCADA Systems Defense in Depth Implementation

SCADA Systems Defense in Depth Implementation

An OT (Operational Technology) system typically comprises multiple control loops, human-machine interfaces, and remote diagnostics and maintenance tools. The system is constructed using various network protocols on layered network architectures, and critical...

read more
Hackers for Hire

Hackers for Hire

The market for Access-as-a-Service remains open for state actors to utilize The category of threat actors known as "hacker-for-hire" consists of entities within the "Access-as-a-Service" (AaaS) market, which mainly consists of companies offering offensive...

read more
Cybersecurity Architecture Considerations

Cybersecurity Architecture Considerations

When designing a security architecture to support OT and IIoT environments, it is important for organizations to take into account various factors such as cybersecurity safety, system availability, distributed systems across geographic locations,...

read more
Cybercriminals on Cloud 9

Cybercriminals on Cloud 9

Widespread cloud adoption provides attack opportunities for cybercriminals The COVID-19 pandemic has expedited the adoption of cloud-based services to facilitate the business processes of organizations. As cybercriminals tend to keep up with the latest...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.