Blog
Get my thoughts on IT/OT Security and the latest developments in the industry
The Critical Convergence: Ransomware Attacks Targeting Operational Technology
Introduction:In recent years, cybersecurity threats have taken a deadly turn by specifically targeting operational technology…
Are AI Models Weakening Cybersecurity?
Introduction:As technology continues to advance, artificial intelligence (AI) has emerged as a powerful tool in…
Cyber Warfare on Operational Technology: The Silent Threat
Introduction:In today’s interconnected world, the reliance on operational technology (OT) has become paramount for various…
Continuous Proof of Trust
Continuous Proof of Trust (CPoT) is a blockchain consensus mechanism that aims to establish trust…
Zero Trust: A Revolutionary Transformation in the Realm of Cybersecurity
Introduction: The contemporary landscape of cybersecurity has witnessed a remarkable paradigm shift with the emergence…
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!