IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications
Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought, cybercriminals in general consider smart devices a “low-hanging fruit” – a target easy... Go on to the site to read the full article ... Read More
IoT Security Fundamentals: IoT vs OT (Operational Technology)
Introduction: Knowing the Notions Industrial Internet of Things (IIoT) incorporates technologies such as machine learning, machine-to-machine (M2M) communication, sensor data, Big Data, etc. This... Go on to the site to read the full article ... Read More
Data Loss Protection (DLP) for ICS/SCADA
Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on company devices, networks and servers.... Go on to the site to read the full article ... Read More
Least Privilege Vulnerabilities Exploitation Case Study
Introduction The principle of least privilege is a security concept that limits security exposure in IT environments through balancing security, productivity, privacy and risk. To put it simply,... Go on to the site to read the full article ... Read More
Data Security in Windows 10
Introduction By design, Windows 10 is more secure than its predecessors Windows 7 and Windows 8.1. That’s what the people from Microsoft say, anyway. One excellent measuring tool regarding security... Go on to the site to read the full article ... Read More
Windows 10 Security Features
Introduction Alexander Benoit, senior consultant and head of Competence Center Microsoft, said something during a Microsoft event in Orlando in September 2017: “Because the threat landscape... Go on to the site to read the full article ... Read More

Key Elements of an Information Security Policy
Learn about SCADA security policies Learn the process of developing a SCADA security policy. This skills course covers: ⇒ Developing SCADA security policy ⇒ Security frameworks and strategy ⇒ And... Go on to the site to read the full article ... Read More
Intrusion Detection and Prevention for ICS/SCADA Environments
Introduction Although the target audience for this writing is information security professionals such as ICS & SCADA or automation managers and engineers, it may also be useful to other IT... Go on to the site to read the full article ... Read More
Network Forensics Overview
Introduction: Start with the basics Most attacks move through the network before hitting the target and they leave some trace. According to Locard’s exchange principle, “every contact leaves a... Go on to the site to read the full article ... Read More
ICS Strengths and Weaknesses (from security perspective)
Introduction We all know that Industrial Control Systems (ICSes) have very specific dynamics. In this article, we’ll take a closer look at their strengths and weaknesses. The first part of this... Go on to the site to read the full article ... Read More