by Eugeniusz Wypior | 8 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybercriminals on Cloud 9 Widespread cloud adoption provides attack opportunities for cybercriminals The COVID-19 pandemic has expedited the adoption of cloud-based services to facilitate the business processes of organizations. As cybercriminals tend to...
by Eugeniusz Wypior | 3 May 2023 | Blog-EN, Newest post
Eugene Wypior Defense-in-Depth Architecture Capabilities A growing number of organizations are adopting digital transformation initiatives that involve modifying their operational technology (OT) environments and formulating plans to establish a multi-tiered...
by Eugeniusz Wypior | 1 May 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 11 – State Sponsored Actors Threat actors play a critical role in the cybersecurity threat landscape. They take advantage of vulnerabilities to cause harm to their targets. It is essential to...
by Eugeniusz Wypior | 26 April 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture When creating a security architecture for an OT environment, it’s advisable to separate the OT network(s) from the corporate network. This is because the nature of network traffic on these two networks is distinct. While...
by Eugeniusz Wypior | 25 April 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 10 – Supply Chain Attacks A supply chain attack is aimed at disrupting the relationship between organizations and their suppliers. It involves a combination of at least two attacks, where the...