by Eugeniusz Wypior | 19 January 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware in Operational Technology Environments Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the...
by Eugeniusz Wypior | 16 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 2 Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their...
by Eugeniusz Wypior | 12 January 2023 | Blog-EN, Newest post
Eugene Wypior The Five Critical Operational Technology (OT) Cybersecurity Controls Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the...
by Eugeniusz Wypior | 9 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 1 Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud. The report showed that the COVID-19 pandemic has shifted...
by Eugeniusz Wypior | 3 January 2023 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 7 In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves...