Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Sensible computing

Sensible computing

95% of cyber security breaches are caused by human error, according to the 2020 IBM Cyber Security Intelligence Index Report. Below is a list of good computing practices to help you reduce the risk of falling victim to computing fraud. Verify Recipients...

read more
Smart Home Security & Privacy

Smart Home Security & Privacy

Smart technology is affecting all areas of our lives. The possibility to have the access and control over everything at our fingertips at any time from any place is very tempting and offers many advantages, however it all comes at a security and privacy cost...

read more
Critical ROCKWELL AUTOMATION  PLCs vulnerabilities

Critical ROCKWELL AUTOMATION PLCs vulnerabilities

On the last day of March this year, CISA released two industrial Controls System Advisories (CSAs) describing vulnerabilities affecting numerous versions of Rockwell’s Logix Controllers and several versions of its Studio 5000 Logix Designer application. The...

read more
Compute in the cloud relevant security considerations

Compute in the cloud relevant security considerations

Cloud computing is fundamentally based on pooling resources and virtualisation is the technology used to convert fixed infrastructure into these pooled resources. At its most basic, virtualisation abstracts resources from their underlying physical assets....

read more
TRITON’s Tactics and Techniques in the ICS domain

TRITON’s Tactics and Techniques in the ICS domain

TRITON malware was originally deployed in 2017 to disrupt the operations of a petrochemical plant in Saudi Arabia and it has recently made headlines on the occasion of an indictment by the U.S Department of Justice in a case of a Global Energy Sector...

read more
Mobile Device Security

Mobile Device Security

Last week we covered the topic of email security. And as mentioned at that time the second most common way used to communicate these days, apart from email, are mobile devices, especially smartphones. They are great devices that make our busy lives easier to...

read more
Email Security Enhancement

Email Security Enhancement

The first email was sent over 50 years ago, and it remains the most popular form of communication (along with the mobile phone) these days. According to Statista we have been sending approximately 320 billion emails every single day in 2021. And this figure...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.