by Eugeniusz Wypior | 13 December 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 5 Once the objectives, user needs, and risks, have been determined, a policy developed and the impact of deploying a BYOD solution on the enterprise has been comprehended it is time to decide on...
by Eugeniusz Wypior | 7 December 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 8 – Host Security Host Security The key concept of Defense in Depth is the fact that there are multiple layers of security implemented throughout the system. And so, after protecting the devices within the...
by Eugeniusz Wypior | 6 December 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 4 Additional costs, implications, and best practices of BYOD The implementation of BYOD introduces new variables in the organisational, legal, and cost domains of the enterprise. Additional costs...
by Eugeniusz Wypior | 30 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 7 – Security Architectures Security Architectures Once an organization has designed and implemented a robust network architecture, they have established the security architecture for the network and systems....
by Eugeniusz Wypior | 29 November 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 3 Developing BYOD policy Having established BYOD objectives, user needs, and the level of risk an enterprise is willing to take, the next step is developing the policy. A policy is essential to...
by Eugeniusz Wypior | 23 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 6 – ICS Network Architectures ICS Network Architectures The integration of once isolated ICSs helped enterprises to manage complex environments, however, merging a modern IT architecture with an originally...