by Eugeniusz Wypior | 9 February 2023 | Newest post
Eugene Wypior Ransomware in OT – Response Strategy Last week we described how to best prepare for a potential ransomware attack in the OT environment from the perspective of the three main areas – people, processes, and technology. Today, we look at best...
by Eugeniusz Wypior | 6 February 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 5 Misconfiguration and Exploitation of Serverless and Container Workloads The shift to cloud infrastructure and the implementation of DevOps practices have enabled IT teams to speed up the delivery of...
by Eugeniusz Wypior | 1 February 2023 | Newest post
Eugene Wypior Preparing for and detecting ransomware attacks in OT environments It is increasingly the small and medium size businesses with OT environments that fall victim to ransomware attacks. The reason for this is that the SMEs often don’t consider themselves to...
by Eugeniusz Wypior | 30 January 2023 | Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 4 System Vulnerabilities Cloud service platforms may have weaknesses, known as “system vulnerabilities,” that could be taken advantage of by malicious actors. These vulnerabilities can...
by Eugeniusz Wypior | 23 January 2023 | Blog-EN, Newest post
Eugene Wypior Cloud Computing – 2022 Top Threats – part 3 Lack of Cloud Security Architecture and Strategy A cloud security strategy and architecture are essential for ensuring the safety and success of cloud endeavors. This includes considerations of such...