by Eugeniusz Wypior | 8 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 13 – Validate inputs based on physical plausibility Ensure operators can only input what’s practical or physically feasible in the process. Set a timer for an operation to the duration it should...
by Eugeniusz Wypior | 6 December 2021 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 1 What is a Security Operations Centre (SOC)? As with many concepts, there isn’t one single definition as to what a Security Operations Centre (SOC) is. According to the SANS Institute, SOC is a combination of...
by Eugeniusz Wypior | 1 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 12 – Instrument for plausibility checks Instrument the process in a way that allows for plausibility checks by cross-checking different measurements. Security Objective Target Group Integrity oI/O...
by Eugeniusz Wypior | 30 November 2021 | Blog-EN, Newest post
Eugene Wypior Zero Trust Architecture For many years the infrastructure security model was based on securing the perimeter of the environment. Defenses were built at the perimeter of the network to prevent malicious actors from getting inside. However, once an...
by Eugeniusz Wypior | 25 November 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 11 – Assign designated register blocks by function (read/write/validate) Assign designated register blocks for specific functions in order to validate data, avoid buffer overflows and block unauthorized...