top of page
Search
All Posts


Cyber Threat Intelligence and ICS/OT Security
Cyber Industrial Control Systems Introduction Industrial Control Systems and Operational Technology (ICS/OT) are information systems...
Danny Vukobratovich
Jun 206 min read


Cryptographic Algorithms: Why Are They Important?
A Lock representing Cryptography Introduction Algorithms are essential for many different fields. Cryptography is an example of a field...
Danny Vukobratovich
Jun 209 min read


Geopolitical Supply Chain Security and Impacts
While there have been physical threats to supply chains, the escalating violence in the Ukraine-Russia conflict introduced the cyber war between Ukraine and Russia and supporting countries. These impacts are not only on military targets but also on businesses that support both sides of the conflict. New threats have been observed through this growing conflict. The increased use of malware and ransomware, which has affected energy production facilities, has been employed to di

Dan V
Jun 126 min read


Urban Critical Infrastructure and Cybersecurity Frameworks
Several cybersecurity frameworks have been developed over the years. The three most popular are the National Institute of Technology and...

Dan V
Jun 73 min read


Enhancing Cybersecurity: Expertise in Risk Management Strategies
In today's increasingly digital world, cybersecurity has become a top priority for businesses of all sizes. With the constant evolution...

Dan V
Apr 172 min read
bottom of page
