Guardian of OT

Blog

Get my thoughts on IT/OT Security and the latest developments in the industry

The Outdated IEC 62443 Standard: An Urgent Need for Evolution Amidst Current Threats

Introduction:In an era where technology rapidly evolves, cybersecurity standards must keep pace to effectively combat…

Read More

DDoS Attacks Strike Indian Airports: How the Threat Was Mitigated

Introduction:In the digital age, the aviation industry heavily relies on technology to ensure smooth operations…

Read More

Red Teaming in Cybersecurity: Unleashing the Power of Simulated Attacks

Introduction:In the ever-evolving landscape of cybersecurity, organizations are increasingly turning to innovative techniques to strengthen…

Read More

Power Sector Peril: Unmasking the Threats of Cybersecurity

Introduction:In an era of digital transformation, the power sector stands at the forefront of technological…

Read More

Unraveling the Cyber Attack on Oil India: Lessons for Securing Critical Energy Infrastructure

Introduction:The energy sector plays a pivotal role in powering economies and ensuring the smooth functioning…

Read More

Malware Payloads for OT Hardware: A Growing Threat to Industrial Control Systems

Introduction:As industries increasingly embrace digitalization and connectivity, the threat landscape expands to include operational technology…

Read More

Cyber-Attacks That Rocked Indian Firms in 2022: Lessons Learned and the Path to Resilience

Introduction:As the world becomes increasingly connected, the threat landscape for cyber-attacks continues to expand. In…

Read More

Unmasking the Recent Cyber Attack on ABB Systems: A Wake-Up Call for Global Industrial Security

Introduction:In the rapidly advancing digital landscape, cyber threats have become a persistent concern for individuals…

Read More

SOC vs SIEM or SOC with SIEM? God! What is this?

In the realm of cybersecurity, two terms that often go hand in hand are SOC…

Read More

I am confused? Are you? SOC 1, SOC 2, SOC 3 are the most used. Where?

When it comes to assessing and providing assurance over an organization’s internal controls and security…

Read More