SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector

ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector

by Eugeniusz Wypior | 28 February 2023 | Blog-EN, Newest post

Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 2 – Prime Threats by Proximity and Sector Prime Threats by Proximity to the EU In the context of the ENISA Threat Landscape, it is crucial to take into account the proximity of cyber threats...
How to effectively utilise MITRE ATT&CK for ICS

How to effectively utilise MITRE ATT&CK for ICS

by Eugeniusz Wypior | 23 February 2023 | Blog-EN, Newest post

Eugene Wypior How to effectively utilise MITRE ATT&CK for ICS MITRE ATT&CK is a knowledge base of cyber attacker TTPs that catalogs behaviours, providing a visual representation of attack patterns that can help detect and respond effectively to attacks....
ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction

ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction

by Eugeniusz Wypior | 21 February 2023 | Blog-EN, Newest post

Eugene Wypior ENISA’s Threat Landscape Report 2022 – Part 1 – Introduction For the past ten years, ENISA – The European Union Agency for Cybersecurity – has been comprising an annual report on the status of the cybersecurity threat landscape. The...
MITRE ATT&CK for ICS – a tool for challenging times

MITRE ATT&CK for ICS – a tool for challenging times

by Eugeniusz Wypior | 16 February 2023 | Blog-EN, Newest post

Eugene Wypior MITRE ATT&CK for ICS – a tool for challenging times As critical infrastructure around the world faces a growing number of potential industrial threats that could potentially disrupt an organization’s operational technology (OT)...
Cloud Computing – 2022 Top Threats – part 6

Cloud Computing – 2022 Top Threats – part 6

by Eugeniusz Wypior | 14 February 2023 | Newest post

Eugene Wypior Cloud Computing – 2022 Top Threats – part 6 Cloud Storage Data Exfiltration The exfiltration of data from cloud storage refers to the unauthorized access, viewing, theft, or usage of sensitive, confidential, or protected information by...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021