by Eugeniusz Wypior | 3 November 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 3 Risk Management as a Defense-in-Depth strategy element for ICS Understanding the business risk associated with ICS cybersecurity and managing that risk is the first stop to improving the enterprise’s...
by Eugeniusz Wypior | 1 November 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 5 Uncontrolled and unobserved third-party access These days more and more enterprises outsource support for some or all of their systems to a third party. If an enterprise does this, it becomes...
by Eugeniusz Wypior | 27 October 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 2 Introduction to Defense-in-Depth strategy elements Defense in Depth is a combination of people, technology, operations, and adversarial awareness that creates a shield of security countermeasures. The setup of...
by Eugeniusz Wypior | 24 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 4 Building an ‘on-prem’ solution in the cloud Cloud has now been around long enough for those who depend heavily on IT infrastructure to realise that moving their operations to the cloud is smart. It is...
by Eugeniusz Wypior | 19 October 2022 | Blog-EN, Newest post
Eugene Wypior Defense in Depth strategies – Part 1 The days of physical separation between the corporate and operational domain, which together with the ‘security through obscurity’ approach were the main protective measures for ICS, are a tale of the...