Skip to content

Welcome to Armordot! Today is : November 27, 2025. Have a nice coffee break!

Armordot

Your Cybersecurity Coffee Break

  • Home
  • Categories
    categories
    • Information Security
    • Events Critique
    • Security Intel
    popular posts
    • The top cybersecurity threats to watch in the second half of 2024.

      The top cybersecurity threats to watch in the second half of 2024.

      The top cybersecurity threats to watch in the second half of 2024.

      The top cybersecurity threats to watch in the second half of 2024
      Tags: 2024 cybersecurity threats, 5G network, AI threats, AI-powered attacks, APTs, biometric security, Cloud Security, critical infrastructure, cryptocurrency threats, Cyber Threats, Cybersecurity, cybersecurity insurance, data privacy, deepfake technology, digital identity, insider threats, IoT vulnerabilities, mobile security, phishing, quantum computing, ransomware, Remote Work Security, smart cities, social engineering, Supply Chain Attacks, zero-day vulnerabilities
    • 58CA1803-42B6-482B-90F3-4E86F1CC52C4

      Understanding NIST: Why It Remains a Top Cybersecurity Framework in 2024 and How to Implement It
      Tags: access control, asset management, continuous improvement, critical infrastructure, Cyber Defense, cyber governance., cyber monitoring, Cyber Resilience, cyber risk assessment, Cyber Threats, Cybersecurity, cybersecurity compliance, cybersecurity posture, data protection, data security, employee training, governance, incident response, Information Security, intrusion detection, NIST CSF, NIST Cybersecurity Framework, recovery plan, risk management, security strategy, SIEM
    • 0309EAE6-C682-4D33-8BBD-EAD29DE6F7DD

      Enhancing Cybersecurity in Operational Technology (OT) Environments
      Tags: access control, continuous monitoring, critical infrastructure security, industrial control systems, IT-OT integration, network segmentation, OT cybersecurity, patch management, SCADA security, security awareness
  • Contact Me
  • About Me

Cybersecurity

  • Featured,Information Security

    How not to suck in SIEM implementation

    This article will focus mainly on important considerations when it comes to SIEM implementation. It also exposes some oversights during the run phase.

    February 27, 2018
  • Featured,Information Security

    Should we review our cybersecurity basics?

    Only a few minutes before the end of 2017, a [...]

    May 29, 2018
  • Events Critique,Featured

    Why Equifax and Deloitte attacks detection took months?

    Equifax and Deloitte breaches detection took months! Why is it the case for big firms like Equifax & Deloitte? A SOC specialist analysis.

    October 24, 2017
  • Featured,Security Intel

    Indicators of Compromise in Threat Intelligence – Let’s speak some InfoSec Jargon

    Indicators of Compromise (IOC) are items of forensic data (like information found in event logs or network flows), that highly indicate conceivably nasty activity in an organization’s system...

    November 2, 2017
  • Events Critique,Featured

    VEVO’s breach! A SOC specialist point of view

    It has been 4 days now that OurMine claimed have been able to leak more than 3TB of corporate information’s from VEVO. As you probably already know, OurMine's recent targets included also

    February 26, 2023
Previous12

Armordot

Your Cybersecurity Coffee Break!

  • Home
  • About
  • Contact

© 2016 - 2025 • ArmorDot • All Rights Reserved.

Page load link

Press “ESC” key to close

main menu
  • Home
  • Contact Me
  • About Me
recent posts
  • Embracing Zero Trust Architecture in cybersecurity
    Zero Trust Architecture, Future of Cybersecurity
    Categories: Cybersecurity Trends, Featured, Information Security, Security Intel
  • The top cybersecurity threats to watch in the second half of 2024.
    The top cybersecurity threats to watch in the second half of 2024
    Categories: Cybersecurity Trends, Featured, Information Security
  • Understanding NIST: Why It Remains a Top Cybersecurity Framework in 2024 and How to Implement It
    Categories: Cybersecurity Trends, Featured, Information Security
get connected
Go to Top