Latest posts

Managing and Securing Remote Access To Critical Infrastructure


Managing and Securing Remote Access To Critical Infrastructure, 1. Securing Remote Access to OT/ICS Systems Yariv Lenchner Sr. Product Manager CyberArk Software 2. Current ICS Security Status ▪ We all know that many ICS systems and devices are vulnerable to cyber attacks ▪ There are many reasons for this: ■ ■ ■ Preferring system availability […]

Planning for and implementing security logging


Introduction Most data security breaches have something in common; they are not overly technical, and in most cases they could have been easily detected – far sooner than they are currently. The available evidence from forensic investigations has shown that over 40% of data breaches remain undetected for months at a time. Our collective goal […]

Verifying NAT Operation and Basic NAT Troubleshooting


Verifying NAT Operation and Basic NAT Troubleshooting Translations Download Print Updated:Dec 19, 2013Document ID:8605 Contents Introduction Prerequisites Requirements Components Used Conventions How to Rule Out NAT Sample Problem: Can Ping One Router But Not Another Problem Summary Sample Problem: Outside Network Devices Cannot Communicate with Inside Routers Problem Summary Troubleshooting Checklists Translation Not Installed in […]

A Cyber Security Chronicle

Cyber Security Chronicle

thanks to   In the opening scene of Hamlet, Bernardo is asked to identify himself by reciting a password before he can take over his castle post from Francisco: “Long live the king!”.1 This exchange, from Shakespeare’s prolific tragedy, is one of the most famous examples of passwords in literature. Historically, we have relied […]

Ransomware+: A New Shade of Evil


Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through […]