Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Software Defined Perimeter

Software Defined Perimeter

A Software Defined Perimeter (SDP) is a network security architecture that uses user authentication and network segmentation in order to grant access to resources based on the principle of authentication first, access later. SDP is a way of implementing the...

read more
Industrial Network Security Architecture – Introduction

Industrial Network Security Architecture – Introduction

The ubiquitous advance of communication technologies of the last two decades has been re-shaping the world as we know it impacts all aspects of our daily lives including the world of industrial automation. One of these advances was the adaptation of the...

read more
Best Practices for Securing your Cloud

Best Practices for Securing your Cloud

There is a good number of boxes for you to tick to make sure the security of your cloud environment is as robust against potential breaches as you can make it. 1. Compliance Follow at least one of the available security frameworks that describe what a secure...

read more
Common Attack Vectors in the Cloud

Common Attack Vectors in the Cloud

Once a threat actor breaches the security of a cloud environment (see our post from last week on Common Cloud Vulnerabilities) it can freely use its resources allowing for scaling the attacks and wiping traces. According to the 2021 IBM Security X-Force...

read more
Common Cloud Vulnerabilities

Common Cloud Vulnerabilities

The increased popularity of cloud services in recent years goes only hand in hand with the increased interest of malicious actors in the opportunities that this new sphere of computing technology brings. Among the most common cloud attack vectors used by...

read more
Cyber Threats – Detection, Response, Mitigation   II

Cyber Threats – Detection, Response, Mitigation II

Mitigations The following advice can enhance organisations’ cyber resilience against cyber threats. Preparedness Establish Reporting Procedures and Ensure Cybersecurity staff continuity Establish your ‘go-to persons’ list for the case of a suspected incident...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.