by Eugeniusz Wypior | 8 March 2022 | Blog-EN, Newest post
Eugene Wypior Best Practices for Securing your Cloud There is a good number of boxes for you to tick to make sure the security of your cloud environment is as robust against potential breaches as you can make it. 1. Compliance Follow at least one of the available...
by Eugeniusz Wypior | 1 March 2022 | Blog-EN, Newest post
Eugene Wypior Common Attack Vectors in the Cloud Once a threat actor breaches the security of a cloud environment (see our post from last week on Common Cloud Vulnerabilities) it can freely use its resources allowing for scaling the attacks and wiping traces....
by Eugeniusz Wypior | 22 February 2022 | Blog-EN, Newest post
Eugene Wypior Common Cloud Vulnerabilities The increased popularity of cloud services in recent years goes only hand in hand with the increased interest of malicious actors in the opportunities that this new sphere of computing technology brings. Among the most common...
by Eugeniusz Wypior | 9 February 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 21 – Trap false negatives and false positives for critical alerts Identify critical alerts and program a trap for those alerts. Set the trap to monitor the trigger conditions and the alert state for any...
by Eugeniusz Wypior | 2 February 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 20 – Monitor PLC memory usage and trend it on the HMI Measure and provide a baseline for memory usage for every controller deployed in the production environment and trend it on the HMI. Security...
by Eugeniusz Wypior | 1 February 2022 | Blog-EN, Newest post
Eugene Wypior Cyber Threats – Detection, Response, Mitigation II Mitigations The following advice can enhance organisations’ cyber resilience against cyber threats. Preparedness Establish Reporting Procedures and Ensure Cybersecurity staff continuity Establish...