SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Critical Infrastructure protection
    • Security Audit ICS
    • Smart Building Cybersecurity
    • Cybersecurity Bill of Materials
    • Penetration tests
    • Security code review
    • Secure Product Development
    • Red Team
    • Cloud Services Security
    • Network segmentation
    • Mobile device security
    • Threat Intelligence
    • Open Source Intelligence / OSINT
    • NIS Directive Audit
    • AMI system security
    • AWS Level 1 MSSP
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
Select Page
Threat Sources, Vulnerabilities, and Incidents – part 2

Threat Sources, Vulnerabilities, and Incidents – part 2

by Eugeniusz Wypior | 8 June 2023 | Newest post

Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 2 System Vulnerabilities and Predisposing Conditions Security controls must provide clear identification of the systems they apply to. These systems can vary greatly in size, scope, and...
VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures

VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures

by Eugeniusz Wypior | 5 June 2023 | Blog-EN, Newest post

Eugene Wypior VOLT TYPHOON – ‘Living of the Land’ – Tactics, Technics and Procedures On the 23rd of May CISA, with a number of other Cyber Security agencies, issued a joint Cybersecurity advisory to highlight a recently discovered cluster of activity of...
Threat Sources, Vulnerabilities, and Incidents – part 1

Threat Sources, Vulnerabilities, and Incidents – part 1

by Eugeniusz Wypior | 31 May 2023 | Blog-EN, Newest post

Eugene Wypior Threat Sources, Vulnerabilities, and Incidents – part 1 Several terms are used to describe the inter-related concepts of threat, threat source, threat event, and incident. A threat is any circumstance or event with the potential to adversely impact...
The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem

The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem

by Eugeniusz Wypior | 29 May 2023 | Blog-EN, Newest post

Eugene Wypior The Impact of the Russia-Ukraine Conflict on the Cybercrime Ecosystem The Russia-Ukraine conflict, which began in 2014, has had a profound impact on various aspects of society. One such area significantly affected is the global cybercrime ecosystem. The...
Distributed Control Systems Defense in Depth Implementation

Distributed Control Systems Defense in Depth Implementation

by Eugeniusz Wypior | 25 May 2023 | Blog-EN, Newest post

Eugene Wypior Distributed Control Systems Defense in Depth Implementation The application of a defense-in-depth strategy is highly beneficial in OT (Operational Technology) environments as it allows for a concentrated focus on safeguarding critical functions. The...
« Older Entries

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
Rybnicka 52, 02-432 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021