by Eugeniusz Wypior | 5 April 2022 | Blog-EN, Newest post
Eugene Wypior Best Authentication Practices Authentication – one of the basic actions we perform day in, day out, often probably not giving much thought to it as it is so ‘basic’. And yet, as it often is in life, simple things can be amongst some of the most...
by Eugeniusz Wypior | 30 March 2022 | Blog-EN, Newest post
Eugene Wypior Industrial Network Security Architecture – Network Protection Segmenting an industrial network into a cell layer, an aggregation layer, and a backbone layer is not enough from a cybersecurity perspective. Such a solution is missing the necessary...
by Eugeniusz Wypior | 28 March 2022 | Blog-EN, Newest post
Eugene Wypior FSB’s Global Energy Sector Intrusion Campaign 2011-2018 Last week, on Thursday, the 24th of March 2022 the US Justice Department officially charged four Russian officials accusing them of carrying out hundreds of cyberattacks targeting critical...
by Eugeniusz Wypior | 28 March 2022 | Blog-EN, Newest post
Eugene Wypior Industrial Network Security Architecture – Network Segmentation The idea of network segmentation is an old concept in IT environments. It began as a way to improve network performance and bandwidth. Recently network segmentation is used proactively...
by Eugeniusz Wypior | 23 March 2022 | Blog-EN, Newest post
Eugene Wypior Industrial Network Security Architecture – Asset and Network Management Quickly advancing digitalisation and rapid spread of the Industrial Internet of Things (IIoT) entails the growth in number of connected devices in industrial networks, which in...