by Eugeniusz Wypior | 25 May 2023 | Blog-EN, Newest post
Eugene Wypior Distributed Control Systems Defense in Depth Implementation The application of a defense-in-depth strategy is highly beneficial in OT (Operational Technology) environments as it allows for a concentrated focus on safeguarding critical functions. The...
by Eugeniusz Wypior | 23 May 2023 | Blog-EN, Newest post
Eugene Wypior Ransomware Trends Imposing cost on ransomware threat actors During the years 2021 and 2022, numerous governments recognized the significance of ransomware as a major threat to national security. In response, they implemented a range of measures,...
by Eugeniusz Wypior | 18 May 2023 | Blog-EN, Newest post
Eugene Wypior SCADA Systems Defense in Depth Implementation An OT (Operational Technology) system typically comprises multiple control loops, human-machine interfaces, and remote diagnostics and maintenance tools. The system is constructed using various network...
by Eugeniusz Wypior | 15 May 2023 | Blog-EN, Newest post
Eugene Wypior Hackers for Hire The market for Access-as-a-Service remains open for state actors to utilize The category of threat actors known as “hacker-for-hire” consists of entities within the “Access-as-a-Service” (AaaS) market, which...
by Eugeniusz Wypior | 10 May 2023 | Blog-EN, Newest post
Eugene Wypior Cybersecurity Architecture Considerations When designing a security architecture to support OT and IIoT environments, it is important for organizations to take into account various factors such as cybersecurity safety, system availability, distributed...