Cybersecurity

  • Blog
  • Cybersecurity

Threat Intelligence

Logically speaking, the very nature of existing cyber security solutions is reactive. We look for some signs that show if any malicious attacks have bypassed or have the possibility to bypass the security systems. This includes your firewall that stops malicious behaviour based on…

Practical Approach to OT Security

Primarily, the knowledge and know-how of SCADA systems were limited to people with fancy degrees. The threat landscape mostly consisted of threats from internal employees or advanced persistent threats sponsored by nation states…

Creating a SiEM Platform

At Netcon, we constantly experiment with technologies that enhance our security service capabilities to our clients. One of our current experiments is building a Security Information and Event Management (SiEM) platform using Wazuh-ELK stack…

Your VPN is not as Secure as You Think

During the early stages of the pandemic, a client reached us asking about their VPN security. As security professionals, we always do our due diligence and shout “its not secure!!”. Is that what we say by default, as security professionals…