Vulnerability Analysis : Critical Unauthorized Remote Code Execution in VMware vCenter (CVE-2021-21972)
High-risk critical vulnerabilities: CVE-2021-21972 is an unauthorized file upload vulnerability in Vcenter. Any location on the vcenter server can exploit this vulnerability to upload files. If it...
Cybersecurity challenges and solutions for the industrial companies
Introduction Industry 4.0 is a new idea for industrial companies and becomes widely adopted by many organizations. Interconnectedness is an important aspect of industry 4.0. This interconnectedness...
How expedited modernization or Industry 4.0 invited cyber risks to the industrial organizations
Industry 4.0 has helped businesses accelerate the pace of transformation of their industry in terms of competitiveness, operational efficiency and time to market, all of which directly translates to...
Cyber risk management for industrial companies
In the 21st century, humanity faces the most rapid industrial digital transformation in history. Dynamic industrial companies are constantly emerging, which means there is vast room for growth and...
Security Testing an industrial control system network
Penetration testing is a simulation of a real-world cyberattack on an organization’s infrastructure. This simulation of a real-world cyberattack will help to identify weaknesses of the...
Industrial Cybersecurity in the year 2022 and beyond
Cybersecurity is a real and compelling problem that the world currently faces, and will continue to face in the next few years to come. Despite technological advances and cutting-edge solutions...
Theft of Intellectual Property in Industrial Companies
The current economic development is private sector-oriented and knowledge-driven. When businesses are at the forefront of economic activity, they need to update and upgrade themselves with market...
Industrial Cybersecurity Best Practices
In today’s industrial organization, Operational Technology (OT) and Industrial Control System (ICS) are increasingly being integrated with cloud technologies and the internet for faster...
Five Steps of Vulnerability Management
Vulnerabilities exist in most assets in an infrastructure. Leaving vulnerabilities unaddressed is an invitation for cyber threats. Addressing vulnerabilities in a timely manner helps to reduce the...
Smart Manufacturing and Cybersecurity
Modern manufacturing ecosystems bring together a complex mix of technologies that rangefrom legacy industrial systems to cutting-edge enterprise IT systems, smart sensors, robotics,and Industrial...