by Eugeniusz Wypior | 10 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 2 Management bypass Defence-in-depth is a widely accepted approach to protecting the critical resources of a system. In addition, a good system architecture practice is to separate the data plane from...
by Eugeniusz Wypior | 6 October 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 3 Security Assurance Level 2 Additionally, to the specification of SL1, IEC 62443-3-3 defines a further 23 requirements (or enhancements to SL1) necessary to be...
by Eugeniusz Wypior | 4 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 1 An Anit-pattern is a common solution or repeated behaviour that is ineffective or has the potential to create more problems than the advantages it is supposed to bring. In security architecture, an...
by Eugeniusz Wypior | 28 September 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 2 The IEC 62443 defines four Security Assurance Levels required for the safe operation of ICS systems mapped to the type of possible attack the security level is designed to...
by Eugeniusz Wypior | 26 September 2022 | Blog-EN, Newest post
Eugene Wypior Enterprise Connected Devices – a cyber security challenge – Part 2 Enterprise Connected Devices (ECDs) are all the devices that interact with, hold, or process an organisation’s data and can include end-user devices such as laptops and...
by Eugeniusz Wypior | 22 September 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 1 IEC 62443 – an introduction In the last decade, industrial automation systems have become the subject of an unprecedented scale of cyber-attacks. Along with the scale of...