Blog
Blog
Top 10 Emerging Cyber-Security Threats for 2030
As the world continues to become more and more digitally connected, cyber security threats are becoming an increasingly pressing issue. As a result, the European Union Agency for Network and Information Security (ENISA) has released a list of the top 10...
Defense in Depth strategies – Part 10 – Third Parties Security Management
Third parties security management Supply Chain Management Potential vulnerabilities in system components, which can lead to the compromise of the entire system and potential loss of operational abilities, can have their origins even before a system...
Bring Your Own Device Security Strategies – Part 6
In today’s post, we continue with the Deployment approaches for BYOD Bootable OS from a removable medium A low-risk way of enabling home PCs to be used for BYOD deployment is the...
Defense in Depth strategies – Part 9 – Security Monitoring
Security Monitoring Putting in place a boundary around the ICS made up of devices, settings and procedures is essential but not sufficient to protect critical assets from unauthorised access, as for each protective device deployed there is a method devised...
Bring Your Own Device Security Strategies – Part 5
Once the objectives, user needs, and risks, have been determined, a policy developed and the impact of deploying a BYOD solution on the enterprise has been comprehended it is time to decide on forms of deployment. Deployment approaches The most popular...
Defense in Depth strategies – Part 8 – Host Security
Host Security The key concept of Defense in Depth is the fact that there are multiple layers of security implemented throughout the system. And so, after protecting the devices within the OT network from an outside attack with the use of policies, zones and...
Bring Your Own Device Security Strategies – Part 4
Additional costs, implications, and best practices of BYOD The implementation of BYOD introduces new variables in the organisational, legal, and cost domains of the enterprise. Additional costs Allowing the employees to use their own devices will increase...
Defense in Depth strategies – Part 7 – Security Architectures
Security Architectures Once an organization has designed and implemented a robust network architecture, they have established the security architecture for the network and systems. The security architecture includes the specific controls and their strategic...
Bring Your Own Device Security Strategies – Part 3
Developing BYOD policy Having established BYOD objectives, user needs, and the level of risk an enterprise is willing to take, the next step is developing the policy. A policy is essential to outline the responsibilities of the enterprise and its employees...
Defense in Depth strategies – Part 6 – ICS Network Architectures
ICS Network Architectures The integration of once isolated ICSs helped enterprises to manage complex environments, however, merging a modern IT architecture with an originally isolated production environment that may not have any or very few cyber security...