by Eugeniusz Wypior | 28 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector Prime Threats by Proximity to the EU In the context of the ENISA Threat Landscape, it is crucial to take into account the proximity of cyber threats...
by Eugeniusz Wypior | 23 February 2023 | Blog-EN, Newest post
Eugene Wypior How to effectively utilise MITRE ATT&CK for ICS MITRE ATT&CK is a knowledge base of cyber attacker TTPs that catalogs behaviours, providing a visual representation of attack patterns that can help detect and respond effectively to attacks....
by Eugeniusz Wypior | 21 February 2023 | Blog-EN, Newest post
Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction For the past ten years, ENISA – The European Union Agency for Cybersecurity – has been comprising an annual report on the status of the cybersecurity threat landscape. The...
by Eugeniusz Wypior | 16 February 2023 | Blog-EN, Newest post
Eugene Wypior MITRE ATT&CK for ICS – a tool for challenging times As critical infrastructure around the world faces a growing number of potential industrial threats that could potentially disrupt an organization’s operational technology (OT)...
by Eugeniusz Wypior | 14 February 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 6 Cloud Storage Data Exfiltration The exfiltration of data from cloud storage refers to the unauthorized access, viewing, theft, or usage of sensitive, confidential, or protected information by...