by Eugeniusz Wypior | 1 February 2023 | Newest post
Eugene Wypior Preparing for and detecting ransomware attacks in OT environments It is increasingly the small and medium size businesses with OT environments that fall victim to ransomware attacks. The reason for this is that the SMEs often don’t consider themselves to...
by Eugeniusz Wypior | 30 January 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 4 System Vulnerabilities Cloud service platforms may have weaknesses, known as “system vulnerabilities,” that could be taken advantage of by malicious actors. These vulnerabilities can...
by Eugeniusz Wypior | 23 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 3 Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such...
by Eugeniusz Wypior | 19 January 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware in Operational Technology Environments Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the...
by Eugeniusz Wypior | 16 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 2 Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their...
by Eugeniusz Wypior | 12 January 2023 | Blog-EN, Newest post
Eugene Wypior The Five Critical Operational Technology (OT) Cybersecurity Controls Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the...