Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

Yes, you can protect your company against ransomware

Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

Threat modeling: what is it, how does it work and why is it so important?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

React to incidents in an organised way by using the Playbook model

Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…

3 recommendations to protect your data

Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

4 pitfalls to avoid when building a CSOC

Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

7 steps to set up a cybersecurity program

To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…

Start typing and press Enter to search

Shopping Cart