Published inSystem WeaknessMastering OpenVAS: Running Scans and Exporting Results via Command Line (GVM-CLI)Have you ever encountered a situation during a pentest where you only have command line access to your Pentest VM and need to run…Jan 29Jan 29
Published inSystem WeaknessImplementing Server Hardening to Achieve CIS ComplianceOverviewNov 25, 2024Nov 25, 2024
Published inSystem WeaknessSecure Network Architecture Controls: Next-Gen Firewall (NGFW)When implementing or reviewing secure network architecture, Next-Gen Firewall serve as critical control in safeguarding network AND…Jun 26, 2024Jun 26, 2024
Published inSystem WeaknessPatching in Critical InfrastructureRead my previous posts on on ICS Security hereMay 27, 2024May 27, 2024
Purdue Model Relevance: Insights from A Cybersecurity ProfessionalI wrote about Purdue model and OT devices in previous blog posts. Find first article here if you haven’t read them.May 17, 2024May 17, 2024
Published inSystem WeaknessSecure Architecture: Infrastructure ControlsThis is the third part in our secure architecture series. Find second part hereMay 9, 2024May 9, 2024
Threat Intelligence 101Over the years cyber threat intelligence has become important for organizations to gather the intelligence on the intrusion organization…May 3, 2024May 3, 2024
Published inSystem WeaknessUser Controls: Secure ArchitectureThis is the second part of our secure architecture series. If you missed the Find the first part, find it here.Apr 26, 2024Apr 26, 2024
Published inSystem WeaknessSpotting the Differences: IT vs. OT EnvironmentsIn this article, I am sharing my learning about key differences in IT and ICS environment which highlights why ICS security requires a…Apr 22, 2024Apr 22, 2024
Purdue Model — Supervisory ZoneThis is the part 3 of our ICS Purdue Model series. Continuing on previous article, in this edition we will talk about Level 2 and Level 3…Apr 22, 2024Apr 22, 2024