Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Ransomware in OT – Response Strategy

Ransomware in OT – Response Strategy

Last week we described how to best prepare for a potential ransomware attack in the OT environment from the perspective of the three main areas – people, processes, and technology. Today, we look at best practices of identifying, limiting, removing,...

read more
Cloud Computing – 2022 Top Threats – part 5

Cloud Computing – 2022 Top Threats – part 5

Misconfiguration and Exploitation of Serverless and Container Workloads The shift to cloud infrastructure and the implementation of DevOps practices have enabled IT teams to speed up the delivery of value to the business. However, the management and scaling...

read more
Cloud Computing – 2022 Top Threats – part 4

Cloud Computing – 2022 Top Threats – part 4

System Vulnerabilities  Cloud service platforms may have weaknesses, known as "system vulnerabilities," that could be taken advantage of by malicious actors. These vulnerabilities can pose a threat to the confidentiality, integrity, and accessibility of...

read more
Cloud Computing – 2022 Top Threats – part 3

Cloud Computing – 2022 Top Threats – part 3

Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such elements as: Cloud deployment models Cloud service models...

read more
Ransomware in Operational Technology Environments

Ransomware in Operational Technology Environments

Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the impacted companies don’t want the market to know they have...

read more
Cloud Computing – 2022 Top Threats – part 2

Cloud Computing – 2022 Top Threats – part 2

Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their valuable resources. These may include digital files, computer...

read more
Cloud Computing – 2022 Top Threats – part 1

Cloud Computing – 2022 Top Threats – part 1

Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud.  The report showed that the COVID-19 pandemic has shifted the cloud security landscape, with the focus now being on...

read more
Bring Your Own Device Security Strategies – Part 7

Bring Your Own Device Security Strategies – Part 7

In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves enrolling personal devices into a corporate system that grants the...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.