by Eugeniusz Wypior | 22 February 2022 | Blog-EN, Newest post
Eugene Wypior Common Cloud Vulnerabilities The increased popularity of cloud services in recent years goes only hand in hand with the increased interest of malicious actors in the opportunities that this new sphere of computing technology brings. Among the most common...
by Eugeniusz Wypior | 9 February 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 21 – Trap false negatives and false positives for critical alerts Identify critical alerts and program a trap for those alerts. Set the trap to monitor the trigger conditions and the alert state for any...
by Eugeniusz Wypior | 2 February 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 20 – Monitor PLC memory usage and trend it on the HMI Measure and provide a baseline for memory usage for every controller deployed in the production environment and trend it on the HMI. Security...
by Eugeniusz Wypior | 1 February 2022 | Blog-EN, Newest post
Eugene Wypior Cyber Threats – Detection, Response, Mitigation II Mitigations The following advice can enhance organisations’ cyber resilience against cyber threats. Preparedness Establish Reporting Procedures and Ensure Cybersecurity staff continuity Establish...
by Eugeniusz Wypior | 26 January 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 19 – Log PLC hard stops and trend them on the HMI Store PLC hard stop events from faults or shutdowns for retrieval by HMI alarm systems to consult before PLC restarts. Time sync for more accurate data. ...