Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Anti-patterns in security architecture – part 3

Anti-patterns in security architecture – part 3

Back-to-back firewall Some wrongly believe that there is a security benefit in ‘doubling up’ on firewalls to implement the same set of controls. In addition, some believe it is beneficial if the two firewalls come from different manufacturers. The thinking...

read more
Anti-patterns in security architecture – part 2

Anti-patterns in security architecture – part 2

Management bypass Defence-in-depth is a widely accepted approach to protecting the critical resources of a system. In addition, a good system architecture practice is to separate the data plane from the management plane. This separation can be achieved with...

read more
Anti-patterns in security architecture – part 1

Anti-patterns in security architecture – part 1

An Anit-pattern is a common solution or repeated behaviour that is ineffective or has the potential to create more problems than the advantages it is supposed to bring.  In security architecture, an anti-pattern is a system design that should be avoided for...

read more
The State of Global Operational Technology 2022 – part 3

The State of Global Operational Technology 2022 – part 3

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.