by Eugeniusz Wypior | 15 May 2023 | Blog-EN, Newest post
Eugene Wypior Hackers for Hire The market for Access-as-a-Service remains open for state actors to utilize The category of threat actors known as “hacker-for-hire” consists of entities within the “Access-as-a-Service” (AaaS) market, which...
by Eugeniusz Wypior | 10 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture Considerations When designing a security architecture to support OT and IIoT environments, it is important for organizations to take into account various factors such as cybersecurity safety, system availability, distributed...
by Eugeniusz Wypior | 8 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybercriminals on Cloud 9 Widespread cloud adoption provides attack opportunities for cybercriminals The COVID-19 pandemic has expedited the adoption of cloud-based services to facilitate the business processes of organizations. As cybercriminals tend to...
by Eugeniusz Wypior | 3 May 2023 | Blog-EN, Newest post
Eugene Wypior Defense-in-Depth Architecture Capabilities A growing number of organizations are adopting digital transformation initiatives that involve modifying their operational technology (OT) environments and formulating plans to establish a multi-tiered...
by Eugeniusz Wypior | 1 May 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 11 – State Sponsored Actors Threat actors play a critical role in the cybersecurity threat landscape. They take advantage of vulnerabilities to cause harm to their targets. It is essential to...
by Eugeniusz Wypior | 26 April 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture When creating a security architecture for an OT environment, it’s advisable to separate the OT network(s) from the corporate network. This is because the nature of network traffic on these two networks is distinct. While...