As IT technology and processes continue to support our business, it is often the case that they do so using legacy technology, or by racing ahead and deploying cutting-edge features and approaches, such as DevOps, SaaS, IoT, and so forth. Both approaches tend to expose security vulnerabilities of supporting systems: with legacy systems, due to their fragility and “stability-over-security” mindsets, and with new technology, due to its focus on functionality without security maturity.
Moreover, some organizations deploy sensitive Operational Technology/Industrial Control Systems, which have a history of serious vulnerabilities that are extremely hard to actively discover, and even harder to remediate quickly.
As organizations need to operate in this reality, it is imperative that the risks of attacks that would exploit these vulnerabilities is managed in an organization-specific manner. In Conscia, we use a variety of approaches to adapt our strategy to specific organizational and technology contexts.
Safer financial systems with Cisco
Cinnober is one of the world’s leading developers and providers of mission critical trading and clearing systems for stock exchanges, banks and clearing houses. Cinnober’s network is based on Cisco switches and a software defined architecture.
to SIEM or not to SIEM
One of the best tools in our detection catalogue is the SIEM. I believe that the SIEM industry has matured quite a lot during the last decade and so have the partners working with SIEM.
First line of defense with DNS Security
Wouldn’t it be great if you could protect the equipment in your network before connecting to the Internet! You have already taken the necessary measures. Still, it feels like something is still missing when it comes to the protection of your equipment …
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Cyber Security is not only about avoiding risk. If done right, a security setup also helps the business stay ahead.
The network touches basically everything in any company. This makes it an ideal platform for improving security as well as business efficiency.
In the age of mobile and cloud, information should be available to employees on any device and in any place.