by Eugeniusz Wypior | 6 December 2021 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 1 What is a Security Operations Centre (SOC)? As with many concepts, there isn’t one single definition as to what a Security Operations Centre (SOC) is. According to the SANS Institute, SOC is a combination of...
by Eugeniusz Wypior | 1 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 12 – Instrument for plausibility checks Instrument the process in a way that allows for plausibility checks by cross-checking different measurements. Security Objective Target Group Integrity oI/O...
by Eugeniusz Wypior | 30 November 2021 | Blog-EN, Newest post
Eugene Wypior Zero Trust Architecture For many years the infrastructure security model was based on securing the perimeter of the environment. Defenses were built at the perimeter of the network to prevent malicious actors from getting inside. However, once an...
by Eugeniusz Wypior | 25 November 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 11 – Assign designated register blocks by function (read/write/validate) Assign designated register blocks for specific functions in order to validate data, avoid buffer overflows and block unauthorized...
by Eugeniusz Wypior | 23 November 2021 | Blog-EN, Newest post
Eugene Wypior Data Privacy, Data Security, Vol. III Browser hardening There are many layers at which you can improve your security and privacy. Apart from the layer of the operating system and its settings, the layer of applications, the next important layer is the...
by Eugeniusz Wypior | 17 November 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 10 – Validate indirections Validate indirections by poisoning array ends to catch fence-post errors. Security Objective Target Group Integrity of PLC variables Product Supplier Integration / Maintenance...