by Eugeniusz Wypior | 28 September 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 2 The IEC 62443 defines four Security Assurance Levels required for the safe operation of ICS systems mapped to the type of possible attack the security level is designed to...
by Eugeniusz Wypior | 26 September 2022 | Blog-EN, Newest post
Eugene Wypior Enterprise Connected Devices – a cyber security challenge – Part 2 Enterprise Connected Devices (ECDs) are all the devices that interact with, hold, or process an organisation’s data and can include end-user devices such as laptops and...
by Eugeniusz Wypior | 22 September 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 1 IEC 62443 – an introduction In the last decade, industrial automation systems have become the subject of an unprecedented scale of cyber-attacks. Along with the scale of...
by Eugeniusz Wypior | 20 September 2022 | Blog-EN, Newest post
Eugene Wypior Enterprise Connected Devices – a cyber security challenge – Part 1 What are Enterprise Connected Devices? Enterprise Connected Devices (ECDs) are devices that interact with, hold, or process an organisation’s data and can include such device...
by Eugeniusz Wypior | 14 September 2022 | Blog-EN, Newest post
Eugene Wypior The State of Global Operational Technology 2022 – part 3 SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in...