by Eugeniusz Wypior | 9 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 1 Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud. The report showed that the COVID-19 pandemic has shifted...
by Eugeniusz Wypior | 3 January 2023 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 7 In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves...
by Eugeniusz Wypior | 29 December 2022 | Blog-EN, Newest post
Eugene Wypior Top 10 Emerging Cyber-Security Threats for 2030 As the world continues to become more and more digitally connected, cyber security threats are becoming an increasingly pressing issue. As a result, the European Union Agency for Network and Information...
by Eugeniusz Wypior | 22 December 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 10 – Third Parties Security Management Third parties security management Supply Chain Management Potential vulnerabilities in system components, which can lead to the compromise of the entire system and...
by Eugeniusz Wypior | 19 December 2022 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 6 In today’s post, we continue with the Deployment approaches for BYOD Bootable OS from a removable medium A low-risk way...
by Eugeniusz Wypior | 14 December 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 9 – Security Monitoring Security Monitoring Putting in place a boundary around the ICS made up of devices, settings and procedures is essential but not sufficient to protect critical assets from unauthorised...