ICS Common Vulnerabilities – 2
Every week, I plan to share with you the vulnerabilities and solution suggestions that I encounter most in Industrial control systems. In this week’s article, I will share Internet Small…
Continue readingDevSecOps Manifesto
DevSecOps is a methodological approach that enables the detection or prediction of potential security vulnerabilities at all levels with the adoption of security from the beginning to the end of…
Continue readingICS Common Vulnerabilities – 1
Every week, I plan to share with you the vulnerabilities and solution suggestions that I encounter most in Industrial control systems. In this week’s article, I will share Remote Desktop…
Continue readingCyber Security’s Confrontation with Emerging and Disruptive Technologies
In this article, I will share with you the relationship between Emerging Technology & Disruptive Technology concepts and cyber security. Let’s start by trying to understand what these two concepts…
Continue readingMetaverse and Web 3.0 Cyber Security Risks
Some extraordinary people always go ahead of technological innovations with their imaginations, and things that seem like dreams to us suddenly become reality. Metaverse, which is used as an abbreviation…
Continue readingDefensible Network Architecture (DNA 2.1)
In today’s blog post I’ll try to share with you Richard’s model of DNA and how important trying to achieve it is when preparing to handle incidents, and that incident…
Continue readingDigital Transformation and Cyber Security
The cyber world is an endlessly expanding field, which offers huge opportunity for the digital transformation due to the subsisting high cyber prospect and interconnectivity. The goal behind digital transformation…
Continue readingVulnerability Points of Blockchain Technology
Blockchain technology is being implemented in lots of innovative applications, together with cryptocurrencies, financial systems, communication systems, IoT, health care, censorship resistance, smart contracts, digital voting, and distributed provenance. Attackers…
Continue readingPhishing and Online Scams
There are various varieties of online scams being notion up by cyber crooks each day. it’s miles crucial in an effort to stumble on what we are provided with (via…
Continue readingHacking Steps and Phases
All hackers have a series of steps to meet their demands, these steps help hackers to get important information step by step and then use that information to penetrate the…
Continue readingSolarwinds Attack and Lessons from the Incident
The Washington Post, one of the largest and oldest newspapers in the United States, reported on December 13, 2020, that many government agencies, including the U.S. Department of the Treasury…
Continue readingSIEM, SOAR and XDR Technologies
Many new safety specialists misunderstand this idea and believe the greater data you have got, the better off you’re. I’ve seen corporation register their tools to random threat intelligence feeds…
Continue reading