Open in app

Sign In

Write

Sign In

Airgap Networks
Airgap Networks

30 Followers

Home

About

Sep 27, 2022

Cybersecurity for the Manufacturing Sector: Reduce Data Integrity Breaches with NIST SP 1800–10

Attacks against OT/ICS continue to increase as these networks become more publicly accessible. Many of these systems continue to be closed-looped even while the business requirements change. While the decision is to alter the network connectivity of the legacy ICS and OT environments, many utility and manufacturing firms have begun…

Cybersecurity

5 min read

Cybersecurity for the Manufacturing Sector: Reduce Data Integrity Breaches with NIST SP 1800–10
Cybersecurity for the Manufacturing Sector: Reduce Data Integrity Breaches with NIST SP 1800–10
Cybersecurity

5 min read


Sep 17, 2022

Triton Ransomware Attack Targets Industrial Processes

Cyberattacks against operational technology in critical infrastructure facilities and chemistry research institutes have grown significantly in frequency and complexity across industries recently. Cyber threats to industrial safety systems, physical safety systems, and other industrial control systems are now at the forefront of national security concerns as geopolitical tensions are reflected…

Cybersecurity

6 min read

Triton Ransomware Attack Targets Industrial Processes
Triton Ransomware Attack Targets Industrial Processes
Cybersecurity

6 min read


Sep 9, 2022

“Proof of Compromise” from Ransomware Attacks on Critical National Infrastructure(CNI)

Operational Technology(OT) cybersecurity has become a hot topic in plant facilities also known as OT, Industrial Automation and Control Systems (IACS), Integrated Control Systems (ICS), etc. The ability to defend against the cyberattack in the IT systems and buffer the OT systems from impact is once again on the headline. …

Cybersecurity

9 min read

“Proof of Compromise” from Ransomware Attacks on Critical National Infrastructure(CNI)
“Proof of Compromise” from Ransomware Attacks on Critical National Infrastructure(CNI)
Cybersecurity

9 min read


Sep 6, 2022

The First Step in Operational Technology(OT) Cybersecurity

Legacy security controls, tools, and practices cannot address OT and IoT devices’ vulnerabilities. Visibility is a fundamental cybersecurity strategy to protect networks, transient assets, and information. In OT cybersecurity, asset management is the most critical part. Understand the security challenges with OT asset inventory: Complex systems across OT asset inventory…

Cybersecurity

5 min read

The First Step in Operational Technology(OT) Cybersecurity
The First Step in Operational Technology(OT) Cybersecurity
Cybersecurity

5 min read


Aug 31, 2022

Ransomware Barometer 2022 Update

Introduction Massive hacks, data breaches, digital scams, and ransomware assaults continued apace during the first half of this challenging year, making the first six months of 2022 seem interminable or fleeting — or both. …

Cybersecurity

5 min read

Ransomware Barometer 2022 Update
Ransomware Barometer 2022 Update
Cybersecurity

5 min read


May 20, 2022

Defending Against Conti Ransomware: Zero Trust Segmentation

Recent cyber-attacks against Ukraine’s infrastructure, including evidence of destructive malware like WhisperGate and HermeticWiper, and the Russian invasion has drawn considerable attention from the cybersecurity community. IT Governance UK recorded 83 data breaches and 5,127,241 cyberattacks In February 2022, which shows that infrastructural security around the globe is on the…

Cybersecurity

4 min read

Defending Against Conti Ransomware: Zero Trust Segmentation
Defending Against Conti Ransomware: Zero Trust Segmentation
Cybersecurity

4 min read


May 18, 2022

Reinventing Security for Corporate Networks with Universal ZTNA

Zero Trust is a security model developed by former Forrester analyst John Kindervag in 2010. Since then, the “zero trust” model has become the most popular concept in the field of cybersecurity. …

Information Technology

5 min read

Reinventing Security for Corporate Networks with Universal ZTNA
Reinventing Security for Corporate Networks with Universal ZTNA
Information Technology

5 min read


May 16, 2022

Securing SD-WAN with Zero Trust Network Segmentation

SD-WAN in 2 Minutes SD-WAN, or software-defined wide-area networking, is a programmatic, automated solution to regulating business network connection and circuit charges. It integrates software-defined networking (SDN) into a platform that companies can use to swiftly set up a smart hybrid WAN. SD-WANs control communication, management, and services between data centers and distant branches…

Networking

5 min read

Securing SD-WAN with Zero Trust Network Segmentation
Securing SD-WAN with Zero Trust Network Segmentation
Networking

5 min read


May 1, 2022

BlackCat Ransomware-as-a-Service and VMware ESXi…Again

FBI warns of BlackCat ransomware that breached Over 60 Organisations Worldwide FBI reported Blackcat malware, a Ransomware as a service (RaaS), was released by Darkside/Blackmatter. The variant ransomware ALPHV and Noberus, are the first-ever malware written in the Rust programming language. BlackCat’s methods include data theft prior to the encryption of client files. The hacker uses stolen credentials prior to executing…

Ransomware

3 min read

BlackCat Ransomware-as-a-Service and VMware ESXi…Again
BlackCat Ransomware-as-a-Service and VMware ESXi…Again
Ransomware

3 min read


Apr 15, 2022

Secure Access into Backup and Recovery Consoles

Recognizing the threat to data backup and restore systems Backing and restoring data is one of several adaptive controls organizations can use to deal with ransomware. Several industry leading backup solutions, including Veeam, Commvault, and Rubrik offer this capability. These solutions use several functions, including artificial intelligence and machine learning to protect against ransomware. …

Backup Software

5 min read

Secure Access into Backup and Recovery Consoles
Secure Access into Backup and Recovery Consoles
Backup Software

5 min read

Airgap Networks

Airgap Networks

30 Followers

Zero Trust Isolation — The Best Defense Against Ransomware Propagation. https://airgap.io

Following
  • M.G. Siegler

    M.G. Siegler

  • Dave Pell

    Dave Pell

  • Rep. Jamie Raskin

    Rep. Jamie Raskin

  • Adam Pennington

    Adam Pennington

  • Cervin Ventures

    Cervin Ventures

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech