How to use Protected Folders in Windows 10

Introduction Ransomware is one of the biggest threats faced by organizations today. After encrypting all files on servers and desktops, ransomware perpetrators demand payment before decrypting what... Go on to the site to read the full article ... Read More

Least Privilege Vulnerabilities

Introduction The principle of least privilege is an essential component of information assurance and security activities. According to the National Institute of Standards and Technology (NIST),... Go on to the site to read the full article ... Read More

Access Control Models for ICS/SCADA environments

Introduction Access control for critical infrastructure requires moving the perimeter to workloads and managing access based on context. This zero-trust approach ensures access based on user/device... Go on to the site to read the full article ... Read More
ICS/SCADA Access Controls

ICS/SCADA Access Controls

Industrial controls systems (ICS) and supervisory control and data acquisition (SCADA) systems (a subset of ICS) manage our critical national infrastructure. Controlling logical access to these... Go on to the site to read the full article ... Read More