top of page


SOAR vs. XIP – Reactive to Proactive Cyber Security Operations
The NIST Cybersecurity Framework identifies five functions (Identify, Protect, Detect, Respond, and Recover) as the five primary pillars...
Stanislaw Banaszak
25 kwi 20211 minut(y) czytania
1 wyświetlenie
0 komentarzy


Orchestra Group conducts first APAC distie deal with emt Distribution
Will offer Orchestra’s full range of Harmony security products in the region. Cyber security vendor Orchestra Group has signed its first...
Stanislaw Banaszak
18 kwi 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Press Release: Aplikacje Krytyczne – Poland selected Harmony IoT by Orchestra Group
Aplikacje Krytyczne deployed Harmony IoT to enhance and strengthen its airspace security and overcome its wireless-born cyberattacks...
Stanislaw Banaszak
29 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Risk of Delay
Many organizations have security policies that have an associated time frame. For example a patch policy could be that a patch must be...
Stanislaw Banaszak
23 mar 20212 minut(y) czytania
1 wyświetlenie
0 komentarzy


Smile – You’re on Camera
Verkada Hack 150,000 security cameras, this time – belonging to Verkada, were exposed in the most recent security breach. This should...
Stanislaw Banaszak
16 mar 20211 minut(y) czytania
0 wyświetleń
0 komentarzy


Exchange, Solarwinds and Supply Chain Attacks
Another major cyber issue is making the rounds this week – the Microsoft Exchange vulnerabilities published last week. The issue is the...
Stanislaw Banaszak
14 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


5 Good Practices for Policy based Cyber Risk
A risk management approach is fundamentally different than the standard approach to cyber security. It requires that organizations...
Stanislaw Banaszak
7 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


…and Cisco Scores a Perfect 10!!
Cisco just published a vulnerability that could allow an unauthenticated, remote attacker to bypass authentication on an affected device....
Stanislaw Banaszak
28 lut 20211 minut(y) czytania
2 wyświetlenia
0 komentarzy


All the (cyber) World’s a Graph
Graphs are about the connectedness of objects. Graph’s show us correlation and dependence between seemingly random objects as well as the...
Stanislaw Banaszak
21 lut 20211 minut(y) czytania
2 wyświetlenia
0 komentarzy


DORA the (Threat Led) Explorer
As financial firms become more digital, the EU decided these firms need to focus on ensuring their operations are as cyber resilient as...
Stanislaw Banaszak
4 gru 20202 minut(y) czytania
0 wyświetleń
0 komentarzy


Security in Numbers
Security (or Safety) in numbers is the hypothesis that, by being part of a large physical group or mass, an individual is less likely to...
Stanislaw Banaszak
25 paź 20202 minut(y) czytania
2 wyświetlenia
0 komentarzy


Red, White and Blue Make Purple
Vulnerability scanning, penetration testing and red teams are the main detective controls for residual cyber risk – i.e. the risk that...
Stanislaw Banaszak
7 wrz 20201 minut(y) czytania
0 wyświetleń
0 komentarzy


Red, White and Blue Cybersecurity Risks
Cybersecurity is moving away from using threats, vulnerabilities and exploits as the management metaphor towards risk-based cybersecurity...
Stanislaw Banaszak
26 sie 20202 minut(y) czytania
1 wyświetlenie
0 komentarzy


Lack of Standard Metrics
Lack of standard metrics to measure, manage and benchmark cyber risk limits security efficiency and effectiveness, making it difficult to...
Stanislaw Banaszak
16 lip 20201 minut(y) czytania
0 wyświetleń
0 komentarzy


Fragmented technologies
Organizations’ cyber security stack consist of 100-150 different disconnected point tools or technologies making it difficult to assess...
Stanislaw Banaszak
17 cze 20202 minut(y) czytania
1 wyświetlenie
0 komentarzy


Constantly Shifting Business Needs
In today’s modern world business needs are constantly shifting, IT and cyber risk landscape require a constant stream of attention and...
Stanislaw Banaszak
15 cze 20201 minut(y) czytania
1 wyświetlenie
0 komentarzy


Is Cyber Security Fit-to-Purpose?
ITIL (IT Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services...
Stanislaw Banaszak
20 paź 20192 minut(y) czytania
0 wyświetleń
0 komentarzy


Cyber security: Emphasize Protect or Detect?
I am a subscriber to the NIST cyber security framework school of thought. Even though it is officially called the “Framework for...
Stanislaw Banaszak
18 paź 20192 minut(y) czytania
0 wyświetleń
0 komentarzy


Measuring the Value of Cyber Security
A value-driven approach to cyber security would help businesses understand where to spend their cyber security budget, and how much to...
Stanislaw Banaszak
12 paź 20192 minut(y) czytania
0 wyświetleń
0 komentarzy


Visibility, Analytics, Policies and Control are the Lynchpin of Cyber Security
Visibility is context. Analytics combine context with events. Policy translates that into a ”plan of action implemented by controls....
Stanislaw Banaszak
22 wrz 20192 minut(y) czytania
0 wyświetleń
0 komentarzy
bottom of page