by Eugeniusz Wypior | 1 November 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 5 Uncontrolled and unobserved third-party access These days more and more enterprises outsource support for some or all of their systems to a third party. If an enterprise does this, it becomes...
by Eugeniusz Wypior | 27 October 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 2 Introduction to Defense-in-Depth strategy elements Defense in Depth is a combination of people, technology, operations, and adversarial awareness that creates a shield of security countermeasures. The setup of...
by Eugeniusz Wypior | 24 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 4 Building an ‘on-prem’ solution in the cloud Cloud has now been around long enough for those who depend heavily on IT infrastructure to realise that moving their operations to the cloud is smart. It is...
by Eugeniusz Wypior | 19 October 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 1 The days of physical separation between the corporate and operational domain, which together with the ‘security through obscurity’ approach were the main protective measures for ICS, are a tale of the...
by Eugeniusz Wypior | 18 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 3 Back-to-back firewall Some wrongly believe that there is a security benefit in ‘doubling up’ on firewalls to implement the same set of controls. In addition, some believe it is beneficial if the two...
by Eugeniusz Wypior | 13 October 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 4 Security Assurance Level 3 By definition should an SL3-compliant system be able to withstand intentional violation of its integrity by the use of sophisticated means...