top of page

The Big Data Blog


Crypto Asset Storage: Laws & Regulations Around the World
We conducted a jurisdiction-by-jurisdiction review of the legal texts (and, in the U.S., formal statements) to determine their specific provisions regarding cold-wallet security and adjacent controls.
Aug 26, 2025


AI in Cybersecurity: Benefits vs. Risks
Artificial intelligence in cybersecurity is not inherently good or bad. Its effectiveness depends entirely on how it’s implemented and how well organizations prepare for the ways it can be misused.
Aug 19, 2025


Erlang SSH Flaw Threatens OT Networks
The Erlang/OTP SSH flaw didn’t just expose a coding error; it exposed a systemic truth: remote access is only as secure as the software behind it.
Aug 12, 2025


Turkish Defense Industry Faces Cyber Espionage Threat
This attack by Dropping Elephant represents a geopolitically motivated, sophisticated cyber-espionage campaign directly targeting Turkey's ascent in defense technologies.
Aug 5, 2025


How USB-Based Attacks Work and How to Protect Critical Systems
The Procolored malware incident highlighted how easily malicious software can travel undetected, particularly through the USB workflows that many OT environments still rely on.
Jul 21, 2025


From Stuxnet to Today: How Malware Has Evolved to Target Physical Processes
A chronological breakdown of how OT-targeting malware has evolved and how threat intelligence and diode-based defense are rising in response.
Jul 14, 2025


Protecting SCADA and PLCs from Lateral Attacks with Data Diodes
Protecting SCADA and PLC systems from lateral attacks isn’t just a cybersecurity best practice—it’s an operational necessity.
Jul 8, 2025


Cybersecurity Compliance in the Energy Sector: ISO/IEC 27019 Requirements
In the energy sector, where operational technology (OT) systems control critical infrastructure, cybersecurity is paramount. ISO/IEC...
Jul 1, 2025


Unpatched Legacy Systems: A Cybersecurity Risk in the Manufacturing Sector
Unpatched legacy systems in manufacturing create serious cybersecurity risks. Learn why these systems are hard to secure, how attackers exploit them, and how DataDiodeX enables safe data flow without disruption.
Jun 24, 2025


CISOs’ Guide to Choosing a Cybersecurity Vendor
For CISOs, selecting the right cybersecurity vendor is not just another procurement task. The choice you make directly influences your...
Jun 17, 2025


What is the Common Vulnerability Scoring System (CVSS)?
CVSS is a publicly available framework developed and maintained by the Forum of Incident Response and Security Teams (FIRST).
Jun 10, 2025


How to Protect Sensitive Data for Privacy Compliance
Here are the foundational components of an enterprise-grade sensitive data protection strategy.
Jun 3, 2025


Cybersecurity for the Oil & Gas Industry
The oil and gas industry drives the global economy, and its digital critical infrastructure is becoming an increasingly prime target for...
May 27, 2025


Increasing Cyber Resilience in the Energy Sector
The global energy industry is undergoing rapid digital transformation. As energy providers modernize their grids, integrate renewables,...
May 20, 2025


Cybersecurity Challenges in Logistics and Supply Chain
Modern supply chains rely on deeply interconnected systems to manage everything from raw material sourcing to last-mile delivery....
May 13, 2025


Quantum Computing Cybersecurity: Risks & Strategies
Quantum-safe cryptography is not just an engineering challenge; it is a strategic imperative for national security, financial stability, and trust in the digital economy.
May 6, 2025


Inside the Volt Typhoon Cyberattack: How a Chinese APT Infiltrated U.S. Critical Infrastructure
In a campaign that has deeply rattled cybersecurity agencies and policymakers, a Chinese state-sponsored threat actor known as Volt...
Apr 29, 2025


Enhancing Cold Wallet Security with Data Diodes
While cold wallets are inherently more secure than their internet-connected counterparts, they are not immune to cyber risks.
Apr 22, 2025


Sharing Threat Intelligence Between Networks: MISP and Data Diodes
Through MISP and data diodes, cybersecurity communities can establish a standardized and reliable threat intelligence sharing infrastructure.
Apr 15, 2025


File Upload Security: Building Resilience Against File-Based Vulnerabilities
Securing the file upload process is not a one-layer job. It demands a combination of policy, technology, and architecture.
Apr 8, 2025
bottom of page