top of page

Aug 13, 2023
Harnessing the Pareto Principle in Risk Management
80% risks can be managed with just 20% of efforts? The Pareto 80/20 rule is a useful concept in risk management.


Aug 10, 2023
OT Cybersecurity Regulations Evolving
Trends in Operational Technology (OT) standards and regulations - focus on managing cyber risks.


Aug 7, 2023
Phishing attacks bypassing MFA - again
Examples of recent phishing attempts show that even popular MFA methods (such as smartphone push based notifications) are becoming obsolete.


Aug 1, 2023
Zero days weaponized on edge devices and servers: rethink your risks
Vulnerabilities in public facing edge devices and apps are being exploited prior to disclosure, let alone patching. Several lessons learned.


Jul 27, 2023
CPS risk management - what's it about?
Risk management in OT environments is different than traditional IT. Hence the rise of OT risk management software.

Jul 25, 2023
SASE architecture - a blueprint for MSSPs
Managing IT security, connecting branches and remote users - all this requires too much work. A new architecture is required.


Jul 21, 2023
Access controls and data-at-rest encryption go hand in hand
Sensitive data exfiltration by way of internal or external malicious users requires rethinking access control and data-at-rest encryption.

Jul 20, 2023
Protecting public web services with WAF - things to watch
Publishing web apps expands the attack surface and complicates management. The not so typical list of things to watch when looking for a WAF

Jul 17, 2023
Are the attacks on Red Hat valid?
The attacks are not justified: Red Hat is a victim of its own success but also a late comer to the cloud IaaS market.
bottom of page