Posts of category: Cybersecurity Strategy

Cybersecurity Strategy·Internet of Things

Information security for IoT 101

Haven’t we got more important things to talk about than information security for IoT? Perhaps, but only because IoT has so far largely flown under the radar of many attackers. At least, apart from…

Cybercrime·Cybersecurity Strategy

ICS under fire: Water treatment plant hacked

Industrial Control Systems (ICS) are like a little brother who is slow on the uptake compared to grown-up IT. Although ICS can do almost anything that IT can do, uses the same protocols and is similar…

Cybersecurity Strategy·Data Security

IT security in 2021: Things can always get worse

Usually this is the spot where we make our forecasts for 2021 based on the latest press releases from IT security providers. But you might have to wait a little longer for that, at least until the…

Cloud·Cybersecurity Strategy·Data Security

SASE – a cloud-based model for network security beyond the data center

SASE emerged as a new buzzword in forums and company presentations during the end of 2019. SASE, pronounced ‘Sassy’, stands for Security Access Service Edge. Put simply, it is an efficient way of…

Cybercrime·Cybersecurity Strategy·Data Security

Full points for DNS vulnerability SIGRed on the CVSS scale

Sometimes finishing with 10 out of 10 points is a reason for celebration. Unfortunately, in this case, things are different. A newly discovered vulnerability in Windows DNS servers, SIGRed has…

Cybersecurity Strategy·Data Security·VPN

Segmenting networks for Industrial Control Systems

IT security is increasingly being recognized by most companies as an important aspect of IT security strategy in Industrial Control Systems (ICS). Some measures differ fundamentally from IT security…

Cloud·Cybersecurity Strategy·Data Security

The right way to join the Microsoft cloud

The public cloud is trending and that is a good thing. For many companies, leveraging cloud resources brings benefits – both in terms of IT flexibility and security. For example, Microsoft spends more…

Cybercrime·Cybersecurity Strategy·Data Security

Coronavirus might be here or there but the money comes from ransomware

Although the title of this post is probably not the world’s greatest contribution to rhyming poetry, it remains true. Even though the world is busy dealing with the impact of the coronavirus,…

Cybercrime·Cybersecurity Strategy·Data Security

Phishing on behalf of the coronavirus

That's all we needed: As if the effects of coronavirus on everyday life are not bad enough, cybercriminals are now using the virus as bait in various phishing campaigns. Numerous security companies…

Cybersecurity Strategy

Working (or not) in times of COVID-19

Previously, permission to work from the home office was a high measure of trust and representative of new work attitude, today it has become a preventative measure just like regular hand washing.…