Articles by the author
List of articles:
Automotive cybersecurity: How to protect modern, connected vehicles?
Your new car has hundreds of millions of lines of code, dozens of controllers (ECUs) and a constant connection to…
How to secure IoT in the enterprise? – Best practices
From smart cameras and access control systems to sensors in factories, your company is already part of the Internet of…
KSC NIS2 vs. software house: Why is audit from the customer the new business reality?
Your clients in regulated sectors (finance, energy, manufacturing) are about to knock on your door with a KSC/NIS2 audit. For…
NIS2 deployment strategy: How to build a foundation of compliance and resilience in 90 days?
The NIS2 directive ushers in a new era in cyber security, setting ambitious goals for companies. The key to success…
Backup that saves production: 3 disaster recovery scenarios for SCADA and PLC systems after an attack
Imagine that, despite the best security measures, a ransomware attack broke through your defenses and encrypted key control systems. Production…
NIS2 directive in practice: What does a manufacturing plant manager need to know about the new obligations?
Until now, cyber security at your facility has been a concern of the IT department. With the NIS2 directive coming…
From the CNC machine to the cloud: The 7 most common attack vectors on production floors
Imagine your factory as a fortress. You’ve invested in solid walls and a main gate. But have you thought about…
Governing OT security: How to create a structure in which IT, OT and the Board of Directors speak with one voice?
Critical vulnerability detected in SCADA system. The IT team says it’s an OT problem. The OT team responds that they…
Business Continuity Plan (BCP) for OT: What if the main control system is unavailable for 24 hours?
Imagine that a cyberattack has completely crippled your central production control system. The incident response team is fighting the threat,…
