Cyber Attacks on Critical Infrastructure - how bad is it?
top of page


We've dug a little deeper into the Danish CERT report on an attack against critical infrastructure. Was it really serious?

- Nov 20
The Case for Identity Threat Detection and Response
While it makes sense to detect malicious activity on endpoints, there is a strong case to integrate identity into EDR strategy.
![[Watch Now] - Securing Critical Infrastructure and OT Environments](https://static.wixstatic.com/media/83b8eb_3e9f393ad936408191eaaa3a05aa68e7~mv2.png/v1/fill/w_320,h_180,fp_0.50_0.50,q_95,enc_auto/83b8eb_3e9f393ad936408191eaaa3a05aa68e7~mv2.png)
- Nov 16
[Watch Now] - Securing Critical Infrastructure and OT Environments
Securing OT environments starts with proper visibility into all assets and detecting deviations from normal behavior. Learn how...


- Nov 13
Who Holds the Blame for the Solarwinds hack?
Executives at organizations victims of cyberattacks are under pressure. Regulators are widely expected to charge them for cyber lapses.


- Nov 10
Cybersecurity regulation - the Croatia example
How will the NIS2 implementation look in Croatia, a typical regional EU member? Lots of stakeholders and coordination ahead.


- Nov 6
Citrix Bleed - a new internet facing vulnerability, again
Having internet facing devices on-premise is becoming untenable and should be considered a huge risk. Better use managed service offerings.

- Oct 30
Maximize EDR Capabilities with Email Telemetry Data
Surfacing email telemetry data within the XDR console can provide useful contextual info for the SOC analyst, but also actionable response.


- Oct 30
NIS2 compliance in OT? Make it easier
How does Radiflow help with NIS2 compliance? The 5 minute video below explains it.


- Oct 26
Converging networking and security with single-vendor SASE
SASE architecture is rapidly gaining traction, but consolidation with existing networking infrastructure is key.

- Oct 24
Cybersecurity breaches move markets - the Okta example
A breach at Okta reveals how quickly the consequences propagate. The incentive to minimize risks is stronger than ever before.

- Oct 20
The Cisco IOS XE vulnerability - regional impact
The latest Cisco IOS XE bug shows that running your own public or internet facing device looks increasingly risky and inappropriate.

- Oct 18
Watch now: preparing for NIS2 and beyond
Watch the event recording: Preparing for NIS2 and beyond. This time primarily from an OT perspective.


- Oct 17
Cyber risk analysis is maturing
Driven by an unlikely actor, the U.S. Securities and Exchange Commission, quantitative cyber risk assessment and analysis is evolving.


- Oct 11
Breach costs are mounting - a glimpse into recent attacks
The costs of data breaches and cyber attacks are becoming all too visible. Here's some recent examples from mostly U.S. based organizations.

- Oct 5
Supply chain risks: the MOVEit fallout is getting bigger
MOVEit software is reminding everybody of the risks and the far reaching impact when a vulnerability propagates through a supply chain.
bottom of page