Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Shared Responsibility for Security in the Public Cloud

Shared Responsibility for Security in the Public Cloud

In general, cloud infrastructure can be broadly divided into two main layers. Firstly, there all are the hardware resources – the storage systems, servers, switches, routers, firewalls, etc – which are the underlying, the ‘invisible’, part of any cloud...

read more
Industrial Control Systems Best Practices

Industrial Control Systems Best Practices

Along with the US Department of Justice naming four Russian spies in late March this year and accusing them of hacking activities spanning nearly a decade impacting critical infrastructure across the globe, CISA has issued a joint Cybersecurity Advisory...

read more
Best Authentication Practices

Best Authentication Practices

Authentication - one of the basic actions we perform day in, day out, often probably not giving much thought to it as it is so ‘basic’. And yet, as it often is in life, simple things can be amongst some of the most important blocks on which other elements of...

read more
FSB’s Global Energy Sector Intrusion Campaign 2011-2018

FSB’s Global Energy Sector Intrusion Campaign 2011-2018

Last week, on Thursday, the 24th of March 2022 the US Justice Department officially charged four Russian officials accusing them of carrying out hundreds of cyberattacks targeting critical infrastructure facilities worldwide. The list of affected countries...

read more
The Cloud and the Dark Web

The Cloud and the Dark Web

The dark web has been the go-to place for shady deals for some years now. It comes then to no surprise that just as one can purchase credit card numbers or other type of data commodity, one can also acquire Cloud accounts access credentials. And the market...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.