SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
Anti-patterns in security architecture – part 3

Anti-patterns in security architecture – part 3

by Eugeniusz Wypior | 18 October 2022 | Blog-EN, Newest post

Eugene Wypior Anti-patterns in security architecture – part 3 Back-to-back firewall Some wrongly believe that there is a security benefit in ‘doubling up’ on firewalls to implement the same set of controls. In addition, some believe it is beneficial if the two...
IEC62443 –  Examples of practical requirements implementation – Part 4

IEC62443 – Examples of practical requirements implementation – Part 4

by Eugeniusz Wypior | 13 October 2022 | Blog-EN, Newest post

Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 4   Security Assurance Level 3 By definition should an SL3-compliant system be able to withstand intentional violation of its integrity by the use of sophisticated means...
Anti-patterns in security architecture – part 2

Anti-patterns in security architecture – part 2

by Eugeniusz Wypior | 10 October 2022 | Blog-EN, Newest post

Eugene Wypior Anti-patterns in security architecture – part 2 Management bypass Defence-in-depth is a widely accepted approach to protecting the critical resources of a system. In addition, a good system architecture practice is to separate the data plane from...
IEC62443 –  Examples of practical requirements implementation – Part 3

IEC62443 – Examples of practical requirements implementation – Part 3

by Eugeniusz Wypior | 6 October 2022 | Blog-EN, Newest post

Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 3   Security Assurance Level 2 Additionally, to the specification of SL1, IEC 62443-3-3 defines a further 23 requirements (or enhancements to SL1) necessary to be...
Anti-patterns in security architecture – part 1

Anti-patterns in security architecture – part 1

by Eugeniusz Wypior | 4 October 2022 | Blog-EN, Newest post

Eugene Wypior Anti-patterns in security architecture – part 1 An Anit-pattern is a common solution or repeated behaviour that is ineffective or has the potential to create more problems than the advantages it is supposed to bring.  In security architecture, an...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021