by Eugeniusz Wypior | 18 May 2023 | Blog-EN, Newest post
Eugene Wypior SCADA Systems Defense in Depth Implementation An OT (Operational Technology) system typically comprises multiple control loops, human-machine interfaces, and remote diagnostics and maintenance tools. The system is constructed using various network...
by Eugeniusz Wypior | 15 May 2023 | Blog-EN, Newest post
Eugene Wypior Hackers for Hire The market for Access-as-a-Service remains open for state actors to utilize The category of threat actors known as “hacker-for-hire” consists of entities within the “Access-as-a-Service” (AaaS) market, which...
by Eugeniusz Wypior | 10 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture Considerations When designing a security architecture to support OT and IIoT environments, it is important for organizations to take into account various factors such as cybersecurity safety, system availability, distributed...
by Eugeniusz Wypior | 8 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybercriminals on Cloud 9 Widespread cloud adoption provides attack opportunities for cybercriminals The COVID-19 pandemic has expedited the adoption of cloud-based services to facilitate the business processes of organizations. As cybercriminals tend to...
by Eugeniusz Wypior | 3 May 2023 | Blog-EN, Newest post
Eugene Wypior Defense-in-Depth Architecture Capabilities A growing number of organizations are adopting digital transformation initiatives that involve modifying their operational technology (OT) environments and formulating plans to establish a multi-tiered...
by Eugeniusz Wypior | 1 May 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 11 – State Sponsored Actors Threat actors play a critical role in the cybersecurity threat landscape. They take advantage of vulnerabilities to cause harm to their targets. It is essential to...