Blog
Blog
Ransomware in OT – Response Strategy
Last week we described how to best prepare for a potential ransomware attack in the OT environment from the perspective of the three main areas – people, processes, and technology. Today, we look at best practices of identifying, limiting, removing,...
Cloud Computing – 2022 Top Threats – part 5
Misconfiguration and Exploitation of Serverless and Container Workloads The shift to cloud infrastructure and the implementation of DevOps practices have enabled IT teams to speed up the delivery of value to the business. However, the management and scaling...
Preparing for and detecting ransomware attacks in OT environments
It is increasingly the small and medium size businesses with OT environments that fall victim to ransomware attacks. The reason for this is that the SMEs often don’t consider themselves to be a potential attack target and as result downplay the importance of...
Cloud Computing – 2022 Top Threats – part 4
System Vulnerabilities Cloud service platforms may have weaknesses, known as "system vulnerabilities," that could be taken advantage of by malicious actors. These vulnerabilities can pose a threat to the confidentiality, integrity, and accessibility of...
Cloud Computing – 2022 Top Threats – part 3
Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such elements as: Cloud deployment models Cloud service models...
Ransomware in Operational Technology Environments
Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the impacted companies don’t want the market to know they have...
Cloud Computing – 2022 Top Threats – part 2
Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their valuable resources. These may include digital files, computer...
The Five Critical Operational Technology (OT) Cybersecurity Controls
Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the dynamic nature of threats and technologies. In a whitepaper published in...
Cloud Computing – 2022 Top Threats – part 1
Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud. The report showed that the COVID-19 pandemic has shifted the cloud security landscape, with the focus now being on...
Bring Your Own Device Security Strategies – Part 7
In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves enrolling personal devices into a corporate system that grants the...