by Józef Sulwiński | 19 January 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware in Operational Technology Environments Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the...
by Józef Sulwiński | 16 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 2 Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their...
by Józef Sulwiński | 12 January 2023 | Blog-EN, Newest post
Eugene Wypior The Five Critical Operational Technology (OT) Cybersecurity Controls Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the...
by Józef Sulwiński | 9 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 1 Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud. The report showed that the COVID-19 pandemic has shifted...
by Józef Sulwiński | 3 January 2023 | Blog-EN, Newest post
Eugene Wypior Bring Your Own Device Security Strategies – Part 7 In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves...