by Eugeniusz Wypior | 25 January 2022 | Blog-EN, Newest post
Eugene Wypior Cyber Threats – Detection, Response, Mitigation I The number of cyberattacks on businesses is constantly rising. According to surveys conducted by Accenture there were on average 270 attacks per company in 2021 which is a 31% increase compared with...
by Eugeniusz Wypior | 20 January 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 18 – Log PLC uptime and trend it on the HMI Log PLC uptime to know when it’s been restarted. Trend and log uptime on the HMI for diagnostics. Security Objective Target Group Monitoring Integration /...
by Eugeniusz Wypior | 12 January 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 17 – Summarise PLC cycle times and trend them on the HMI Summarize PLC cycle time every 2-3 seconds and report to HMI for visualization on a graph Security Objective Target Group Monitoring Integration /...
by Eugeniusz Wypior | 11 January 2022 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 5 What is Cyber Threat Intelligence? According to Gartner, Threat Intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or...
by Eugeniusz Wypior | 5 January 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 16 – Define a safe process state in case of a PLC restart Define safe states for the process in case of PLC restarts (e.g., energize contacts, de-energize, keep the previous state) Security Objective...