by Eugeniusz Wypior | 21 November 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 2 Before implementing Bring Your Own Device solution an enterprise must gain clarity in the following four areas: Objectives User needs Risks Exploring alternatives Objectives The first step an...
by Eugeniusz Wypior | 17 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 5 Physical Security in ICS environment Physical security controls are any physical measures, either active or passive, that limit physical access to any information assets in the ICS environment. Organizations...
by Eugeniusz Wypior | 15 November 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 1 Bring Your Own Device (BYOD) Introduction Bring Your Own Device is an arrangement whereby the employees are permitted to bring their own personally owned devices such as laptops, tablets, or mobile...
by Eugeniusz Wypior | 9 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 4 Risk Management Approach – Asset Inventory and Risk Characterisation The attack surface for an operation includes all the vectors associated with gaining access to the systems or equipment considered...
by Eugeniusz Wypior | 8 November 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 6 The un-patchable system There are systems that can’t stop and must be operational all around the clock. This is a lack of design foresight as such systems can’t have security patches applied without...
by Eugeniusz Wypior | 3 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 3 Risk Management as a Defense-in-Depth strategy element for ICS Understanding the business risk associated with ICS cybersecurity and managing that risk is the first stop to improving the enterprise’s...