by Eugeniusz Wypior | 21 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction For the past ten years, ENISA – The European Union Agency for Cybersecurity – has been comprising an annual report on the status of the cybersecurity threat landscape. The...
by Eugeniusz Wypior | 16 February 2023 | Blog-EN, Newest post
Eugene Wypior MITRE ATT&CK for ICS – a tool for challenging times As critical infrastructure around the world faces a growing number of potential industrial threats that could potentially disrupt an organization’s operational technology (OT)...
by Eugeniusz Wypior | 23 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 3 Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such...
by Eugeniusz Wypior | 19 January 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware in Operational Technology Environments Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the...
by Eugeniusz Wypior | 16 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 2 Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their...
by Eugeniusz Wypior | 12 January 2023 | Blog-EN, Newest post
Eugene Wypior The Five Critical Operational Technology (OT) Cybersecurity Controls Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the...