The Radiflow Cyber-Security Blog

Subscribe to the Radiflow Security Blog – new posts will conveniently show up in your inbox the day they’re posted.
What is Cyber Alert Fatigue & How to Avoid it

What is Cyber Alert Fatigue & How to Avoid it

Whilst alert fatigue is understandable, it is also potentially very dangerous. You need a clear strategy for dealing with potential cybersecurity fatigue, and ensuring that alerts are of the highest possible quality in order to minimize the incidence of important alerts remaining ignored.

read more
Continuous Monitoring of OT Key Risk Indicators (KRIs)

Continuous Monitoring of OT Key Risk Indicators (KRIs)

Assessing OT network risk requires knowing both the impact and the Loss Event Frequency associated with a specific threat. “Guesstimating” would result in skewed findings; therefore, a data-driven approach, based on breach attack simulation is needed.

read more
How to Prepare an Industrial Cyber Incident Response Strategy

How to Prepare an Industrial Cyber Incident Response Strategy

Effective industrial cybersecurity starts with devising an OT security strategy through a structured process of gathering information about the ICS network and its components, setting up a threat detection mechanism, and planning further threat mitigation measures.

read more
Linking Asset-Based and Adversary-Based Risk Analyses

Linking Asset-Based and Adversary-Based Risk Analyses

Radiflow’s VP Business Development Rani Kehat explains the differences between asset- and adversary-based cyber-risk analyses, and how combining the two approaches helps to produce better risk scoring and optimize OT security expenditure.

read more