Secure configuration management

Secure configuration management Authentication and tracing logs Misconfiguration is a common issue in network Cyber Security events. They may be caused by intentional or unintentional operator changes, or sometimes by attacks from external networking. According to ISA62443 specification, any networking component that can be configured dynamically should follow the below principles: 1. User identification and …

Secure configuration management Read More »

Firewalls vs. Data Diodes

Firewalls vs. Data Diodes To see is to believe When talking about data Diodes, a question that people often ask is, “So, what’s the difference between firewalls and Data Diodes?”  We say that the two are complementary, as Data Diodes provide additional security measures for especially vulnerable network segments. Looking into more detail, however, it …

Firewalls vs. Data Diodes Read More »

Scroll to Top