Blog With No Sidebar

  1. Home
  2. /
  3. Blog With No Sidebar
Threat Modelling: A CISO’s Perspective Against the Status Quo

Threat Modelling: A CISO’s Perspective Against the Status Quo

This blog discusses the importance of threat modelling in cybersecurity and emphasises the need to question traditional approaches to ensure they align with strategic objectives rather than compliance exercises.https://blg.cyberbakery.net/content/images/2024/08/Designer.jpeg

September 13, 2024
Operational Technology (OT) Security Architecture: Safeguarding Critical Infrastructure in the Age of Digital Transformation

Operational Technology (OT) Security Architecture: Safeguarding Critical Infrastructure in the Age of Digital Transformation

With the introduction of the SOCI Act in Australia and similar measures worldwide, there is a growing demand for strong security frameworks to defend against cyber threats. In this blog, we will explore OT security architecture, its significance, and key components ensuring its effectiveness.https://blg.cyberbakery.net/content/images/2024/09/Designer–1-.jpeg

September 13, 2024
5 Steps for Securing Your Open-Source Supply Chain

5 Steps for Securing Your Open-Source Supply Chain

The growing demand for open-source software has led to an increase in available components, but many are poorly maintained, leading to supply chain attacks and developers being targeted. Edwin Kwan suggests taking five steps to secure the software supply chain.https://blg.cyberbakery.net/content/images/2024/07/software-supply-chain.jpg

September 13, 2024
CyberBakery Chronicles

CyberBakery Chronicles

Your Weekly Cybersecurity Update (23 August 2024)

* OpenAI Blocks Iranian Influence Operation Using ChatGPT for U.S. Election Propaganda
* National Public Data Published Its Own Passwords
* Toyota confirms third-party data breach impacting customers
* Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware
* Thousands of Websites Exposed AWS Credentials, Leading to Large-Scale Extortion Campaign
* GitHub Actions Exposing Authentication Tokens in Popular Open-Source Prhttps://blg.cyberbakery.net/content/images/2024/08/CyberBakeryChronicles-2.jpg

August 23, 2024