Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…
Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…
Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…
Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…
Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…
After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…
To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…