cybersecurity risk

Paul Hadjy

Paul Hadjy, CEO and Co-Founder of Horangi Paul is a technology visionary working across the US, Middle East, Singapore, Korea, and New Zealand to build business in both the private and public sectors. Paul spent over 6 years at Palantir and was the Head of Information Security at Grab.  MySec.TV Cybersecurity Risk due to Misconfigured […]

Paul Hadjy Read More »

Securing the Enterprise in the COVID world – The State of Email Security

Email: An Invaluable Tool and a Growing Threat As COVID-19 swept the globe, businesses found themselves more reliant than ever on email. But this greater dependence also posed new and insidious threats. There’s no question that the pandemic-driven shift from office to home-based work was a major contributor. With the flip of a figurative switch,

Securing the Enterprise in the COVID world – The State of Email Security Read More »

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 3

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 3 Read More »

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 2

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 2 Read More »

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 1

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide – Volume 1 Read More »