OUR SERVICES
CONSULTING SERVICES
PKI MANAGED SERVICE
CERIAL
ABOUT US
WHAT WE DO
OUR VISION
CONSULTING SERVICES
PKI MANAGED SERVICE
CERIAL
What we do
Our vision
work for us
Partners
blog
contact
EN
DE
Blog
Tags:
Cybersecurity
,
OT
,
Why is cybersecurity crucial for manufacturing?
READ MORE >
Tags:
Identity Access Management
,
Industrial IoT
,
Public Key Infrastructure
,
Navigating the Certificate Lifecycle Management Landscape
READ MORE >
Tags:
Public Key Infrastructure
,
Identity Access Management
,
Industrial IoT
,
Securely Integrating PKI Functionality in Legacy Environments: BxC's Expert Solutions
READ MORE >
Tags:
Cybersecurity
,
Management
,
Strategy
,
Securing Cyberspace: Waterfall or Agile? Determining the Right Fit for Your Company
READ MORE >
Tags:
OT
,
Cyber
,
Cybersecurity
,
Lessons learned from GICSP certification
READ MORE >
Tags:
Cyber
,
Cybersecurity
,
Women in Cyber: BlackHoodie at Troopers 2023 in Heidelberg
READ MORE >
Tags:
Public Key Infrastructure
,
Identity Access Management
,
Industrial IoT
,
PKI Integration for Legacy Infrastructure
READ MORE >
Tags:
Cybersecurity
,
OT
,
Definition and explanation of OT network segmentation
READ MORE >
Tags:
Risk
,
OT
,
Cybersecurity
,
What is XDR and which benefits can it bring to OT Security?
READ MORE >
Tags:
OT
,
Strategy
,
Management
,
OT Security Guide - Where to start?
READ MORE >
Tags:
Cybersecurity
,
OT
,
Risk
,
Top 5 Cyber Threats for Manufacturing Companies
READ MORE >
Tags:
OT
,
Cybersecurity
,
Management
,
What Is the Purdue Model for ICS Security?
READ MORE >
Tags:
Cybersecurity
,
OT
,
Management
,
Definition and Explanation of Operational Technology (OT) Security
READ MORE >
Tags:
Cyber
,
Cyberattack
,
OT
,
Risk
,
Colonial Pipeline Attack Recap
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
The Libero Role in Digitalization Projects
The role of Libero is often unknown or underestimated. At BxC, we would like to stress the criticality of this role in big cybersecurity transformation projects.
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
The Certification Balance
Are cyber certifications truly proof of competency? Can we apply the saying “the more, the better” to certification?
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
How Our Cyber Language Shapes the Way We Think
How Our Cyber Language Shapes the Way We Think
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
Why network micro-segmentation can be counterproductive
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
Why stopping cybersecurity programs should not be taboo
A plea for regularly questioning cybersecurity improvement programs
READ MORE >
Tags:
Access Management
,
Identity Access Management
,
Industrial IoT
,
Cybersecurity
,
Secure IIoT Sensor Integration
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
The Pratfall Effect & Cybersecurity
Why you should acknowledge wisely your cybersecurity weaknesses
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
The Dangerous Average
Why might a single KPI blind from cybersecurity reality?
READ MORE >
Tags:
OT
,
Strategy
,
OT Security Assessments
Lessons learned across global cross-industry ICS cybersecurity assessments
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Cyber Security: Lead by Context, not by Control in Cyber
How Netflix’s Culture Deck can help Cyber?
READ MORE >
Tags:
Access Management
,
Identity Access Management
,
Industrial IoT
,
OT
,
IAM in connected OT
An overview of IAM domains and their importance for OT security
READ MORE >
Tags:
Industrial IoT
,
OT
,
Strategy
,
OT Security Strategy
How to plan a long-term ICS cybersecurity strategies based on a structured methodology
READ MORE >
Tags:
OT
,
Strategy
,
Shifting the Cyber Focus
Why we need more attention to cybersecurity organization and staffing
READ MORE >
Tags:
Cyber
,
Management
,
OT
,
Risk
,
PKI as an enabler for a secure industry 4.0
How PKI can become a key enabler to your production environment
READ MORE >