SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
Select Page
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
Ransomware in Operational Technology Environments

Ransomware in Operational Technology Environments

by Eugeniusz Wypior | 19 January 2023 | Blog-EN, Newest post

Eugene Wypior Ransomware in Operational Technology Environments Malware and ransomware attacks against ICS environments have increased significantly in the last five years. Many ransomware attacks (including big ones) are believed not to be reported because the...
Cloud Computing – 2022 Top Threats – part 2

Cloud Computing – 2022 Top Threats – part 2

by Eugeniusz Wypior | 16 January 2023 | Blog-EN, Newest post

Eugene Wypior Cloud Computing – 2022 Top Threats – part 2 Insufficient Identity, Credentials, Access and Key Mgt, Privileged Accounts Identity, credential, and access management systems are essential for organisations to manage, monitor, and secure their...
The Five Critical Operational Technology (OT) Cybersecurity Controls

The Five Critical Operational Technology (OT) Cybersecurity Controls

by Eugeniusz Wypior | 12 January 2023 | Blog-EN, Newest post

Eugene Wypior The Five Critical Operational Technology (OT) Cybersecurity Controls Organisations are expected to defend their digital assets to acceptable levels and make balanced risk decisions. This is challenging due to the complexities of the organisation and the...
Cloud Computing – 2022 Top Threats – part 1

Cloud Computing – 2022 Top Threats – part 1

by Eugeniusz Wypior | 9 January 2023 | Blog-EN, Newest post

Eugene Wypior Cloud Computing – 2022 Top Threats – part 1 Mid-2022 The Cloud Security Alliance (CSA) conducted a survey on over 700 cloud security experts on that very topic – security in the cloud.  The report showed that the COVID-19 pandemic has shifted...
Bring Your Own Device Security Strategies – Part 7

Bring Your Own Device Security Strategies – Part 7

by Eugeniusz Wypior | 3 January 2023 | Blog-EN, Newest post

Eugene Wypior Bring Your Own Device Security Strategies – Part 7 In today’s post, we continue with the Deployment approaches for BYOD Mobile Device Management (MDM) The approach of Mobile Device Management (MDM) for Bring Your Own Device (BYOD) involves...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
office@seqred.pl

Privacy Policy All rights reserved © SEQRED 2021