Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Karakurt Data Extortion Group

Karakurt Data Extortion Group

Just over three months ago, on June 1st, the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN) jointly issued a Cybersecurity Advisory on the Karakurt Team...

read more
The State of Global Operational Technology 2022 – part 2

The State of Global Operational Technology 2022 – part 2

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more
Paving the way for Post-Quantum Cryptography

Paving the way for Post-Quantum Cryptography

Two months ago, in early July, the US National Institute of Science and Technology (NIST) announced that the results of a six-year competition amongst the set of post-quantum algorithms had resulted in the selection of four initial algorithms (with the view...

read more
The State of Global Operational Technology 2022 – part 1

The State of Global Operational Technology 2022 – part 1

SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...

read more
Cybersecurity of Smart Buildings

Cybersecurity of Smart Buildings

When the topic of cybersecurity in Smart Buildings comes up, the question arises about the challenges related to the trend and technology, and who should be concerned about the topic. Building owners, investors, building managers, tenants, as well as...

read more
Phishing Attacks & Mitigation – part 2

Phishing Attacks & Mitigation – part 2

According to the CISCO’s 2021 Cybersecurity threat trends report, phishing accounts for around 90% of data breaches with at least one person having clicked a phishing link in around 86% of organisations. How to protect yourself from falling prey to a (spear)...

read more
Phishing Attacks & Mitigation – part 1

Phishing Attacks & Mitigation – part 1

As more and more of our everyday professional (and personal) lives take place online, so do increase the nefarious activities of those actors who want to abuse this fact and profit by extracting privileged information or influence us into taking an action...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.