Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Top 10 Emerging Cyber-Security Threats for 2030

Top 10 Emerging Cyber-Security Threats for 2030

As the world continues to become more and more digitally connected, cyber security threats are becoming an increasingly pressing issue. As a result, the European Union Agency for Network and Information Security (ENISA) has released a list of the top 10...

read more
Bring Your Own Device Security Strategies – Part 5

Bring Your Own Device Security Strategies – Part 5

Once the objectives, user needs, and risks, have been determined, a policy developed and the impact of deploying a BYOD solution on the enterprise has been comprehended it is time to decide on forms of deployment. Deployment approaches  The most popular...

read more
Defense in Depth strategies – Part 8 – Host Security

Defense in Depth strategies – Part 8 – Host Security

Host Security The key concept of Defense in Depth is the fact that there are multiple layers of security implemented throughout the system. And so, after protecting the devices within the OT network from an outside attack with the use of policies, zones and...

read more
Bring Your Own Device Security Strategies – Part 4

Bring Your Own Device Security Strategies – Part 4

Additional costs, implications, and best practices of BYOD The implementation of BYOD introduces new variables in the organisational, legal, and cost domains of the enterprise. Additional costs Allowing the employees to use their own devices will increase...

read more
Bring Your Own Device Security Strategies – Part 3

Bring Your Own Device Security Strategies – Part 3

Developing BYOD policy Having established BYOD objectives, user needs, and the level of risk an enterprise is willing to take, the next step is developing the policy. A policy is essential to outline the responsibilities of the enterprise and its employees...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.