by Eugeniusz Wypior | 8 June 2023 | Blog-EN, Newest post
Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 2 System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and...
by Eugeniusz Wypior | 5 June 2023 | Blog-EN, Newest post
Eugene Wypior VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures On the 23rd of May CISA, with a number of other Cyber Security agencies, issued a joint Cybersecurity advisory to highlight a recently discovered cluster of activity of...
by Eugeniusz Wypior | 31 May 2023 | Blog-EN, Newest post
Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 1 Several terms are used to describe the inter-related concepts of threat, threat source, threat event, and incident. A threat is any circumstance or event with the potential to adversely impact...
by Eugeniusz Wypior | 29 May 2023 | Blog-EN, Newest post
Eugene Wypior The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem The Russia-Ukraine conflict, which began in 2014, has had a profound impact on various aspects of society. One such area significantly affected is the global cybercrime ecosystem. The...
by Eugeniusz Wypior | 25 May 2023 | Blog-EN, Newest post
Eugene Wypior Distributed Control Systems Defense in Depth Implementation The application of a defense-in-depth strategy is highly beneficial in OT (Operational Technology) environments as it allows for a concentrated focus on safeguarding critical functions. The...
by Eugeniusz Wypior | 23 May 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware Trends Imposing cost on ransomware threat actors During the years 2021 and 2022, numerous governments recognized the significance of ransomware as a major threat to national security. In response, they implemented a range of measures,...