by Eugeniusz Wypior | 27 June 2022 | Blog-EN, Newest post
Eugene Wypior Software Defined Network Security Benefits What is SDN? Traditional networking uses integrated hardware and software to direct traffic across a series of routers and switches. Originally SDN was designed to virtualize the network by separating the...
by Eugeniusz Wypior | 22 June 2022 | Blog-EN, Newest post
Eugene Wypior TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 5 TRITON malware was first identified during an attack on a Saudi Arabian petrochemical plant facility in the year 2017 and it targets Schneider Electric’s Triconex...
by Eugeniusz Wypior | 20 June 2022 | Blog-EN, Newest post
Eugene Wypior Secure Messaging Messaging is a part of the everyday life of almost all of us. And as a form of digital communication, it is subject to security issues applying to other forms of this kind of communication. Here are some hints to improve your security in...
by Eugeniusz Wypior | 15 June 2022 | Blog-EN, Newest post
Eugene Wypior TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 4 In part 4 of the TRITON tactics and technics series come the Credential Access techniques for stealing credentials like account names and passwords. Techniques used to...
by Eugeniusz Wypior | 13 June 2022 | Blog-EN, Newest post
Eugene Wypior Social Media Privacy & Security Social Media is a nearly unlimited pool of information about its users. For starters, there is a multitude of information available on social media platforms that the users provide willingly with premeditation but...