by Eugeniusz Wypior | 26 April 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture When creating a security architecture for an OT environment, it’s advisable to separate the OT network(s) from the corporate network. This is because the nature of network traffic on these two networks is distinct. While...
by Eugeniusz Wypior | 25 April 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 10 – Supply Chain Attacks A supply chain attack is aimed at disrupting the relationship between organizations and their suppliers. It involves a combination of at least two attacks, where the...
by Eugeniusz Wypior | 20 April 2023 | Blog-EN, Newest post
Eugene Wypior OT Security – Introduction – OT Overview OT Overview Operational technology (OT) refers to a diverse range of programmable systems and devices that interact with the physical world, either directly or by managing devices that do. These...
by Eugeniusz Wypior | 18 April 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 9 – Disinformation & Misinformation In contemporary times, digital platforms have become the primary source of news and media. Social media platforms, news outlets, and search engines are...
by Eugeniusz Wypior | 13 April 2023 | Blog-EN, Newest post
Eugene Wypior The impact of IT threats on OT environment In recent years, cyber threats have been on the rise, not only targeting information technology (IT) systems but also industrial control systems (ICS) and operational technology (OT). Particularly, there has...
by Eugeniusz Wypior | 11 April 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 8 – Impact of Russian war The impact of Internet usage and the unrestricted dissemination of information is being felt by every individual in Europe. The internet has become an essential...