by Eugeniusz Wypior | 4 January 2022 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 4 The human factor of SOCs According to the definition of Security Operations Centre (SOC) we used in part 1 of these series, ‘SOC is a combination of people, processes and technologies (…)’. How does a SOC’s team...
by Eugeniusz Wypior | 23 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 15 – Restrict third-party data interfaces Restrict the type of connections and available data for 3rd party interfaces. The connections and/or data interfaces should be well defined and restricted to...
by Eugeniusz Wypior | 21 December 2021 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 3 The SOC’s main purpose is the identification and reaction to threats. A SOC needs to be able to see what is going on the in the information system it is intending to protect. What else you envision your SOC to do...
by Eugeniusz Wypior | 15 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 14 – Disable unneeded / unused communication ports and protocols PLC controllers and network interface modules generally support multiple communication protocols that are enabled by default. Disable...
by Eugeniusz Wypior | 14 December 2021 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 2 You can only truly protect what you know you have 1. Asset inventory You must understand what your assets are in order to understand what you are going to protect. Make sure you have identified all the devices...