How to use Protected Folders in Windows 10
Introduction Ransomware is one of the biggest threats faced by organizations today. After encrypting all files on servers and desktops, ransomware perpetrators demand payment before decrypting what... Go on to the site to read the full article ... Read More
Least Privilege Vulnerabilities
Introduction The principle of least privilege is an essential component of information assurance and security activities. According to the National Institute of Standards and Technology (NIST),... Go on to the site to read the full article ... Read More
Access Control Models for ICS/SCADA environments
Introduction Access control for critical infrastructure requires moving the perimeter to workloads and managing access based on context. This zero-trust approach ensures access based on user/device... Go on to the site to read the full article ... Read More

ICS/SCADA Access Controls
Industrial controls systems (ICS) and supervisory control and data acquisition (SCADA) systems (a subset of ICS) manage our critical national infrastructure. Controlling logical access to these... Go on to the site to read the full article ... Read More