Blog
Blog
Distributed Control Systems Defense in Depth Implementation
The application of a defense-in-depth strategy is highly beneficial in OT (Operational Technology) environments as it allows for a concentrated focus on safeguarding critical functions. The principles of defense-in-depth are adaptable and can be effectively...
Ransomware Trends
Imposing cost on ransomware threat actors During the years 2021 and 2022, numerous governments recognized the significance of ransomware as a major threat to national security. In response, they implemented a range of measures, encompassing both legal and...
SCADA Systems Defense in Depth Implementation
An OT (Operational Technology) system typically comprises multiple control loops, human-machine interfaces, and remote diagnostics and maintenance tools. The system is constructed using various network protocols on layered network architectures, and critical...
Hackers for Hire
The market for Access-as-a-Service remains open for state actors to utilize The category of threat actors known as "hacker-for-hire" consists of entities within the "Access-as-a-Service" (AaaS) market, which mainly consists of companies offering offensive...
Cybersecurity Architecture Considerations
When designing a security architecture to support OT and IIoT environments, it is important for organizations to take into account various factors such as cybersecurity safety, system availability, distributed systems across geographic locations,...
Cybercriminals on Cloud 9
Widespread cloud adoption provides attack opportunities for cybercriminals The COVID-19 pandemic has expedited the adoption of cloud-based services to facilitate the business processes of organizations. As cybercriminals tend to keep up with the latest...
Defense-in-Depth Architecture Capabilities
A growing number of organizations are adopting digital transformation initiatives that involve modifying their operational technology (OT) environments and formulating plans to establish a multi-tiered information architecture that aligns with their business...
ENISA’s Threat Landscape Report 2022 – Part 11 – State Sponsored Actors
Threat actors play a critical role in the cybersecurity threat landscape. They take advantage of vulnerabilities to cause harm to their targets. It is essential to understand their motivations, goals, and tactics to effectively manage cyber threats and...
Cybersecurity Architecture
When creating a security architecture for an OT environment, it's advisable to separate the OT network(s) from the corporate network. This is because the nature of network traffic on these two networks is distinct. While the corporate network may allow...
ENISA’s Threat Landscape Report 2022 – Part 10 – Supply Chain Attacks
A supply chain attack is aimed at disrupting the relationship between organizations and their suppliers. It involves a combination of at least two attacks, where the first attack is directed at a supplier and is then utilized to attack a target, with the...