<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - mbuhamad cybersecurity</title>
	<atom:link href="https://mbuhamad.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://mbuhamad.com/category/uncategorized/</link>
	<description></description>
	<lastBuildDate>Thu, 24 Jul 2025 05:24:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://mbuhamad.com/wp-content/uploads/2025/07/cropped-newlogo-1-32x32.gif</url>
	<title>Uncategorized Archives - mbuhamad cybersecurity</title>
	<link>https://mbuhamad.com/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Understand The Cyber Attacks</title>
		<link>https://mbuhamad.com/2025/07/24/understand-the-cyber-attacks/</link>
					<comments>https://mbuhamad.com/2025/07/24/understand-the-cyber-attacks/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 05:24:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=355</guid>

					<description><![CDATA[<p>The post <a href="https://mbuhamad.com/2025/07/24/understand-the-cyber-attacks/">Understand The Cyber Attacks</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="780" height="1024" src="https://mbuhamad.com/wp-content/uploads/2025/07/top-8-cyber-attacks-2024-780x1024.webp" alt="" class="wp-image-356" srcset="https://mbuhamad.com/wp-content/uploads/2025/07/top-8-cyber-attacks-2024-780x1024.webp 780w, https://mbuhamad.com/wp-content/uploads/2025/07/top-8-cyber-attacks-2024-229x300.webp 229w, https://mbuhamad.com/wp-content/uploads/2025/07/top-8-cyber-attacks-2024-768x1008.webp 768w, https://mbuhamad.com/wp-content/uploads/2025/07/top-8-cyber-attacks-2024.webp 800w" sizes="(max-width: 780px) 100vw, 780px" /></figure>
<p>The post <a href="https://mbuhamad.com/2025/07/24/understand-the-cyber-attacks/">Understand The Cyber Attacks</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/24/understand-the-cyber-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Building Cyber Resilience in Operational Technology Environments</title>
		<link>https://mbuhamad.com/2025/07/18/building-cyber-resilience-in-operational-technology-environments/</link>
					<comments>https://mbuhamad.com/2025/07/18/building-cyber-resilience-in-operational-technology-environments/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 17:55:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=348</guid>

					<description><![CDATA[<p>This. report I wrote back in 2021 for an organization. I believe this entity still missing OT cybersecurity. Introduction In 2019, Dmitri Alperovitch, co-founder and former CTO of CrowdStrike, remarked: “There are three types of companies: those that know they’ve been compromised, those that haven’t realized they’ve been compromised, and those who can defend themselves [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/18/building-cyber-resilience-in-operational-technology-environments/">Building Cyber Resilience in Operational Technology Environments</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>This. report I wrote back in 2021 for an organization. I believe this entity still missing OT cybersecurity.</p>



<p></p>



<h2 class="wp-block-heading">Introduction</h2>



<p>In 2019, Dmitri Alperovitch, co-founder and former CTO of CrowdStrike, remarked:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><em>“There are three types of companies: those that know they’ve been compromised, those that haven’t realized they’ve been compromised, and those who can defend themselves against a compromise.”</em></p>
</blockquote>



<p>This post explores how critical infrastructure organizations—particularly those managing Operational Technology (OT)—can build the capabilities to defend themselves effectively in today’s evolving threat landscape.</p>



<h2 class="wp-block-heading">The Economic Impact of Cybercrime</h2>



<p>According to&nbsp;<em>Cybercrime Magazine</em>, the global cost of cybercrime surged to $6 trillion in 2021, up from $3 trillion in 2015. This staggering figure marks the greatest transfer of economic wealth in history and exceeds the profits of all major illegal drug trades combined. The impact is not just financial—it undermines innovation, deters investment, and threatens the global digital economy.</p>



<h2 class="wp-block-heading">From Theory to Reality: OT Under Attack</h2>



<p>Cyber warfare became a reality in 2010 with the discovery of&nbsp;<em>Stuxnet</em>, a sophisticated malware targeting SCADA systems in a nuclear facility. The attack caused physical damage to OT systems that were believed to be fully isolated (air-gapped) from the internet.</p>



<p>In today’s digitized environments, OT systems are increasingly connected—for monitoring, remote support, and analytics. This connectivity introduces new vulnerabilities. In 2021, a hacker gained access to a Florida water treatment plant’s OT system using stolen remote access credentials and attempted to poison the water supply.</p>



<p>Attacks on OT are no longer rare. Botnets have crippled communication networks. Ransomware has disrupted emergency services. Critical infrastructure, both regionally and globally, has suffered significant operational and financial losses.</p>



<h2 class="wp-block-heading">What Is Cybersecurity in OT?</h2>



<p>For the purpose of this article,&nbsp;<strong>cybersecurity</strong>&nbsp;in OT refers to the protection of the following:</p>



<ul class="wp-block-list">
<li><strong>Confidentiality</strong> of operational data and systems</li>



<li><strong>Integrity</strong> of controls and processes</li>



<li><strong>Availability</strong> of services and infrastructure</li>
</ul>



<p>Together, these three pillars—known as the&nbsp;<strong>CIA triad</strong>—form the foundation of any robust cybersecurity strategy.</p>



<h2 class="wp-block-heading">Cybersecurity as Risk Management</h2>



<p>Electricity grids, water systems, and industrial plants form the backbone of modern society. Disruptions to these systems can have cascading effects—impacting everything from hospitals and airports to telecommunications and energy production.</p>



<p>Cybersecurity risk management is not limited to technology purchases. It involves adopting structured frameworks such as:</p>



<ul class="wp-block-list">
<li><strong>ISO/IEC 27001</strong></li>



<li><strong>Zero Trust Architecture</strong></li>



<li><strong>NIST Cybersecurity Framework (CSF)</strong></li>
</ul>



<p>These standards establish a&nbsp;<strong>security baseline</strong>—a collection of essential policies, controls, and best practices that help mitigate the most common and dangerous threats to OT systems.</p>



<h2 class="wp-block-heading">The NIST Framework: A Global Benchmark</h2>



<p>To address growing threats to critical infrastructure, the United States issued&nbsp;<strong>Executive Order 13636</strong>&nbsp;in 2013. It tasked the National Institute of Standards and Technology (NIST) with developing a flexible, risk-based cybersecurity framework for critical sectors.</p>



<p>The result was the&nbsp;<strong>NIST Cybersecurity Framework</strong>, now widely adopted across industries and governments. It is organized into five core functions:</p>



<ol class="wp-block-list">
<li><strong>Identify</strong> – Understand the environment and associated risks</li>



<li><strong>Protect</strong> – Implement safeguards for delivery of critical services</li>



<li><strong>Detect</strong> – Monitor for cybersecurity events</li>



<li><strong>Respond</strong> – Take action during an incident</li>



<li><strong>Recover</strong> – Restore capabilities after a disruption</li>
</ol>



<p>This structured approach enables organizations to assess maturity, prioritize resources, and strengthen resilience.</p>



<h2 class="wp-block-heading">Regional and International Cooperation</h2>



<p>In 2015, a high-level meeting between U.S. leadership and members of the Gulf Cooperation Council (GCC) underscored the importance of critical infrastructure cybersecurity. The outcomes included:</p>



<ul class="wp-block-list">
<li>Joint consultation on cybersecurity initiatives</li>



<li>Sharing of best practices in policy, incident response, and resilience</li>



<li>Technical assistance and capacity-building</li>



<li>Cybersecurity exercises and workshops</li>
</ul>



<p>These initiatives illustrate a shared commitment to improving cyber readiness across borders.</p>



<h2 class="wp-block-heading">Final Thoughts</h2>



<p>Cybersecurity in operational technology is no longer optional—it is a national imperative. The threats are real, the risks are rising, and the consequences of inaction are severe. Organizations managing critical infrastructure must treat cybersecurity as a continuous, strategic process supported by leadership, standards, and global collaboration.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Let me know if you’d like help with:</p>



<ul class="wp-block-list">
<li>Creating a featured image</li>



<li>Optimizing SEO metadata (title, description, keywords)</li>



<li>Adding call-to-action sections</li>



<li>Embedding download buttons (for PDF version)</li>



<li>Translating the post to Arabic for a bilingual audien</li>
</ul>
<p>The post <a href="https://mbuhamad.com/2025/07/18/building-cyber-resilience-in-operational-technology-environments/">Building Cyber Resilience in Operational Technology Environments</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/18/building-cyber-resilience-in-operational-technology-environments/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Silent Struggle: Navigating Government Work in Developing Countries</title>
		<link>https://mbuhamad.com/2025/07/18/the-silent-struggle-navigating-government-work-in-developing-countries/</link>
					<comments>https://mbuhamad.com/2025/07/18/the-silent-struggle-navigating-government-work-in-developing-countries/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 05:39:20 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=346</guid>

					<description><![CDATA[<p>Professionals in developing countries often face systemic challenges that severely limit their ability to contribute meaningfully to society. One of the most significant obstacles lies within the government sector, which is frequently plagued by entrenched bureaucracy, internal politics, and a culture that prioritizes appeasing superiors over delivering results. A major issue is the appointment of [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/18/the-silent-struggle-navigating-government-work-in-developing-countries/">The Silent Struggle: Navigating Government Work in Developing Countries</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p></p>



<p>Professionals in developing countries often face systemic challenges that severely limit their ability to contribute meaningfully to society. One of the most significant obstacles lies within the government sector, which is frequently plagued by entrenched bureaucracy, internal politics, and a culture that prioritizes appeasing superiors over delivering results.</p>



<p>A major issue is the appointment of managers based not on merit or capability, but on social connections. Many individuals in leadership roles lack basic managerial or even interpersonal skills. While such appointments may benefit a few personally, they are detrimental to workplace productivity, morale, and broader societal progress.</p>



<p>From my observation, government employees typically fall into three categories:</p>



<ol start="1" class="wp-block-list">
<li>The Performers – These individuals are adept at talking and posturing. They often rise to top positions because they know how to play the system and say what those in power want to hear.</li>



<li>The Apathetic – Grounded in reality but disengaged, this group shows up to work physically, yet does everything possible to avoid meaningful contribution.</li>



<li>The Changemakers – These are the rare individuals genuinely committed to reform and improvement. Unfortunately, their efforts are often met with resistance. Many are forced out, sidelined, or simply choose to leave in frustration.</li>
</ol>



<p>The result is a system that discourages innovation, demoralizes talent, and perpetuates inefficiency. For real progress to occur, there must be a shift toward merit-based leadership, accountability, and a culture that values competence over connections. As we say in Kuwait انطرني</p>



<p></p>



<p>Mashal Buhamad</p>
<p>The post <a href="https://mbuhamad.com/2025/07/18/the-silent-struggle-navigating-government-work-in-developing-countries/">The Silent Struggle: Navigating Government Work in Developing Countries</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/18/the-silent-struggle-navigating-government-work-in-developing-countries/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Choosing the Right Path: IP-MPLS vs. MPLS-TP</title>
		<link>https://mbuhamad.com/2025/07/17/choosing-the-right-path-ip-mpls-vs-mpls-tp/</link>
					<comments>https://mbuhamad.com/2025/07/17/choosing-the-right-path-ip-mpls-vs-mpls-tp/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 09:32:27 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=323</guid>

					<description><![CDATA[<p>I once authored a technical report comparing IP-MPLS and MPLS-TP, outlining why IP-MPLS was the stronger long-term choice—technically, operationally, and economically. The head of the sector responsible for the technology reviewed and agreed with the assessment. The case was clear. The analysis was thorough. The direction was validated. But the organization chose the opposite path. [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/17/choosing-the-right-path-ip-mpls-vs-mpls-tp/">Choosing the Right Path: IP-MPLS vs. MPLS-TP</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>I once authored a technical report comparing IP-MPLS and MPLS-TP, outlining why IP-MPLS was the stronger long-term choice—technically, operationally, and economically. The head of the sector responsible for the technology reviewed and agreed with the assessment. The case was clear. The analysis was thorough. The direction was validated.</p>



<p>But the organization chose the opposite path.</p>



<p>It’s moments like this that remind you:&nbsp;<strong>sometimes, it’s not about the right technology. It’s about other factors.</strong></p>



<p>In the evolution of communication technologies, two major paradigms emerged: time division multiplexing (TDM/SDH) and packet-based communication (IP). TDM technologies were historically favored for critical communication due to their reliability, predictable latency, and fixed routing. Packet-based technologies, while more adaptable and scalable, came with trade-offs—namely, variable delay and occasional packet loss—making them better suited for non-critical data transfer and local networking.</p>



<p>As modern network demands increase, new transport technologies are being evaluated to replace legacy TDM infrastructure. Two contenders stand out:&nbsp;<strong>MPLS-TP (Multiprotocol Label Switching &#8211; Transport Profile)</strong>&nbsp;and&nbsp;<strong>IP-MPLS (IP-based Multiprotocol Label Switching)</strong>.</p>



<h3 class="wp-block-heading">MPLS-TP: Purpose-Built for Deterministic Transport</h3>



<p>MPLS-TP was developed specifically to mimic the predictable, reliable characteristics of TDM within a packet-switched framework. Its goal is to bring deterministic behavior to packet networks, maintaining consistent latency and providing guaranteed delivery paths. This makes MPLS-TP appealing for environments where strict timing and reliability are paramount.</p>



<p>However, MPLS-TP has limitations in terms of flexibility and interoperability. Variations in implementation among vendors can make multi-vendor integration challenging, potentially leading to vendor lock-in and increased operational costs.</p>



<h3 class="wp-block-heading">IP-MPLS: Flexible and Future-Proof</h3>



<p>IP-MPLS, in contrast, is a more flexible and broadly adopted technology. It supports a wide range of applications—from enterprise data to critical infrastructure traffic. IP-MPLS delivers many of the same reliability features as MPLS-TP while also enabling support for modern network requirements, including IoT integration, smart grid communication, and virtualization of infrastructure.</p>



<p>Standardization is a key advantage of IP-MPLS. Broad industry adoption has led to strong interoperability between equipment from different vendors, reducing both capital and operational expenses and simplifying network evolution over time.</p>



<h3 class="wp-block-heading">Key Considerations</h3>



<ol class="wp-block-list">
<li><strong>Versatility</strong>: IP-MPLS supports a diverse range of traffic types and can adapt to evolving use cases, making it more suitable for modern multi-service networks.</li>



<li><strong>Reliability with Flexibility</strong>: It offers SDH-like reliability while maintaining the adaptability of IP networks.</li>



<li><strong>Cost and Interoperability</strong>: Due to its standardization, IP-MPLS is more interoperable and cost-effective compared to MPLS-TP.</li>



<li><strong>Industry Direction</strong>: The networking industry is shifting toward IP-MPLS, driven by its scalability, extensibility, and compatibility with emerging technologies.</li>
</ol>



<h3 class="wp-block-heading">Conclusion</h3>



<p>While MPLS-TP serves a niche purpose for deterministic transport, the broader advantages of IP-MPLS—flexibility, reliability, cost-efficiency, and industry momentum—make it the preferred choice for modern networks. As communication infrastructure continues to evolve, technologies that can seamlessly bridge reliability and adaptability will define the next generation of critical networks.</p>
<p>The post <a href="https://mbuhamad.com/2025/07/17/choosing-the-right-path-ip-mpls-vs-mpls-tp/">Choosing the Right Path: IP-MPLS vs. MPLS-TP</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/17/choosing-the-right-path-ip-mpls-vs-mpls-tp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to write incident response plan</title>
		<link>https://mbuhamad.com/2025/07/17/how-to-write-incident-response-plan/</link>
					<comments>https://mbuhamad.com/2025/07/17/how-to-write-incident-response-plan/#comments</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 07:36:38 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=288</guid>

					<description><![CDATA[<p>Never pay someone to create your incident response plan, and don’t just copy a generic one. Instead, create a plan that makes sense for your organization. Ensure it is clearly understood by both the incident response team and top management. Ideally, the entire plan should fit on one A4 page—two pages at most. Purpose As [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/17/how-to-write-incident-response-plan/">How to write incident response plan</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Never pay someone to create your incident response plan, and don’t just copy a generic one. Instead, create a plan that makes sense for your organization. Ensure it is clearly understood by both the incident response team and top management. Ideally, the entire plan should fit on one A4 page—two pages at most. </p>



<h2 class="wp-block-heading"><strong>Purpose</strong></h2>



<p>As the digital threat landscape continues to evolve in complexity and scale, organizations must adopt a structured, strategic approach to cybersecurity incident response. This guide outlines the framework, responsibilities, and protocols for managing security incidents. It aims to minimize damage, ensure timely response, preserve organizational integrity, and support recovery and future preparedness.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Definition of an Incident</strong></h2>



<p>An incident refers to any attempted or actual unauthorized access, disruption, misuse, or compromise of information systems, networks, or data. Incident handling is not merely reactive—it is a proactive strategy that ensures:</p>



<ul class="wp-block-list">
<li><strong>Identification:</strong> Recognizing the presence and characteristics of a potential threat or breach.</li>



<li><strong>Analysis:</strong> Assessing the scope, severity, and potential impact.</li>



<li><strong>Prioritization:</strong> Categorizing incidents based on urgency and consequence.</li>



<li><strong>Response:</strong> Taking coordinated action to contain, investigate, mitigate, and prevent recurrence.</li>
</ul>



<p>Depending on the nature of the threat, this may include external notification (e.g., law enforcement, regulatory bodies, or third-party incident responders).</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Communication Channels</strong></h2>



<p>To maintain operational continuity during an incident—even in cases of full system compromise—a secure, out-of-band communication channel must be maintained. In this framework, messaging platforms that are external to the organization’s primary infrastructure (e.g., encrypted messaging apps) are used to ensure incident response teams remain connected and responsive.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Authorization and Decision-Making</strong></h2>



<p>The designated Incident Response Team (IRT) is empowered to:</p>



<ul class="wp-block-list">
<li>Act immediately and decisively to contain incidents (e.g., disconnecting systems, blocking traffic).</li>



<li>Collaborate with external security vendors, governmental agencies, or law enforcement when necessary.</li>



<li>Activate any formal incident response agreements or memorandums of understanding with partner organizations.</li>
</ul>



<p>These authorities are designed to eliminate delay and ensure an efficient and effective response.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Incident Severity Classification</strong></h2>



<p>To standardize response efforts, incidents are classified into three tiers based on severity and impact:</p>



<h3 class="wp-block-heading"><strong>Level 1 – Low Severity</strong></h3>



<p>These incidents pose minimal risk to critical operations but warrant documentation and periodic review.</p>



<p>Examples include:</p>



<ul class="wp-block-list">
<li>Unauthorized port scans on non-critical systems.</li>



<li>Virus or malware detections successfully blocked before system compromise.</li>



<li>Repeated failed login attempts to non-sensitive systems.</li>



<li>Abnormal network behavior without clear malicious intent.</li>



<li>Receipt of phishing emails or threat indicators from trusted sources.</li>



<li>Non-critical data leaks involving public or low-sensitivity documents.</li>
</ul>



<h3 class="wp-block-heading"><strong>Level 2 – Moderate Severity</strong></h3>



<p>Moderate incidents could escalate if ignored. They require immediate attention, team consultation, and formal action planning.</p>



<p>Examples include:</p>



<ul class="wp-block-list">
<li>Unauthorized scans targeting critical infrastructure.</li>



<li>Unexplained or unauthorized physical access attempts.</li>



<li>Denial-of-Service (DoS) or Distributed DoS (DDoS) activity.</li>



<li>Persistent failures in two-factor authentication.</li>



<li>Detection of potential insider threats.</li>



<li>Unauthorized website content alterations.</li>



<li>Leakage of sensitive internal documents or credentials to external sources (e.g., dark web).</li>
</ul>



<h3 class="wp-block-heading"><strong>Level 3 – High Severity</strong></h3>



<p>Critical incidents that threaten the confidentiality, integrity, or availability of key systems or sensitive data. They demand an immediate, all-hands response and notification to senior leadership.</p>



<p>Examples include:</p>



<ul class="wp-block-list">
<li>Detection of ransomware or active malware infections.</li>



<li>System-wide outages or failures.</li>



<li>Attacks targeting industrial control systems or critical infrastructure.</li>



<li>Evidence of internal malicious activity or data tampering.</li>



<li>Exploitation of zero-day vulnerabilities.</li>



<li>Breaches involving confidential, regulated, or personal data, or that could significantly harm the organization’s operations, reputation, or national interest.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Incident Response Team (IRT)</strong></h2>



<p>The IRT is composed of cross-functional members from IT, cybersecurity, legal, communications, and executive leadership. Roles include:</p>



<ul class="wp-block-list">
<li><strong>Incident Commander:</strong> Leads response efforts and decision-making.</li>



<li><strong>Technical Analyst:</strong> Conducts forensic investigation and impact assessment.</li>



<li><strong>Communications Liaison:</strong> Coordinates internal and external messaging.</li>



<li><strong>Legal Advisor:</strong> Ensures compliance with regulations and manages legal exposure.</li>



<li><strong>Executive Sponsor:</strong> Provides leadership oversight and strategic alignment.</li>
</ul>



<p>The IRT operates under clear protocols and meets regularly to review incidents and test response readiness through tabletop exercises or simulated attacks.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>A robust incident response framework is essential for maintaining operational resilience in the face of growing cybersecurity threats. By clearly defining incident types, response authority, and communication procedures, organizations can respond swiftly and effectively—minimizing impact and reducing recovery time.</p>
<p>The post <a href="https://mbuhamad.com/2025/07/17/how-to-write-incident-response-plan/">How to write incident response plan</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/17/how-to-write-incident-response-plan/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Do you we really need AI</title>
		<link>https://mbuhamad.com/2025/07/16/do-you-we-really-need-ai/</link>
					<comments>https://mbuhamad.com/2025/07/16/do-you-we-really-need-ai/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Wed, 16 Jul 2025 15:07:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=231</guid>

					<description><![CDATA[<p>The definitive answer is yes — AI is no longer a future consideration; it’s a present-day reality that’s transforming every sector. Whether you&#8217;re a government institution or a private enterprise, integrating AI into your core strategy is no longer optional — it’s essential. The time to start is now. However, it’s critical to approach AI [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/16/do-you-we-really-need-ai/">Do you we really need AI</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>The definitive answer is yes — AI is no longer a future consideration; it’s a present-day reality that’s transforming every sector. Whether you&#8217;re a government institution or a private enterprise, integrating AI into your core strategy is no longer optional — it’s essential. The time to start is now.</p>



<p>However, it’s critical to approach AI adoption with awareness. Public AI platforms like ChatGPT, while powerful, pose significant data security risks when misused. If your team is feeding sensitive or internal data into public AI tools, you may be unknowingly contributing to data leakage. Think carefully about how much confidential information may have already been exposed.</p>



<p>Meanwhile, malicious actors are already leveraging AI to enhance and automate their attacks — from phishing campaigns to deepfake generation to automated vulnerability discovery. If you&#8217;re not deploying AI-powered defense tools, you&#8217;re operating at a growing disadvantage. The threat landscape is evolving faster than ever, and without AI-enabled security capabilities, traditional defenses simply can&#8217;t keep up.</p>



<p></p>
<p>The post <a href="https://mbuhamad.com/2025/07/16/do-you-we-really-need-ai/">Do you we really need AI</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/16/do-you-we-really-need-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>There is no thing like being hit by a Ransomware</title>
		<link>https://mbuhamad.com/2025/07/16/there-is-no-thing-like-being-hit-by-a-ransomware/</link>
					<comments>https://mbuhamad.com/2025/07/16/there-is-no-thing-like-being-hit-by-a-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Wed, 16 Jul 2025 14:57:36 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=227</guid>

					<description><![CDATA[<p>There’s nothing quite like being on-site at an organization that has just been hit by ransomware — and I’ve been there. One of the most striking incidents I responded to involved a government entity that had invested millions in IT infrastructure and cybersecurity tools. Despite their significant spending, they lacked a cohesive cybersecurity strategy. Their [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/16/there-is-no-thing-like-being-hit-by-a-ransomware/">There is no thing like being hit by a Ransomware</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>There’s nothing quite like being on-site at an organization that has just been hit by ransomware — and I’ve been there. One of the most striking incidents I responded to involved a government entity that had invested millions in IT infrastructure and cybersecurity tools. Despite their significant spending, they lacked a cohesive cybersecurity strategy.</p>



<p>Their environment was protected by multiple firewalls, which gave them a dangerous false sense of security. But the real issue was deeper: their internal team had limited understanding of how attackers think, and they had never performed a comprehensive vulnerability assessment. There was no proactive defense, no detection capabilities, and no incident response plan in place. It was a chaotic, sobering scene — and a powerful reminder that tools alone don&#8217;t secure an organization. Strategy, mindset, and continuous validation do.</p>



<p></p>
<p>The post <a href="https://mbuhamad.com/2025/07/16/there-is-no-thing-like-being-hit-by-a-ransomware/">There is no thing like being hit by a Ransomware</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/16/there-is-no-thing-like-being-hit-by-a-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Proof of Concept (POC)</title>
		<link>https://mbuhamad.com/2025/07/14/hello-world/</link>
					<comments>https://mbuhamad.com/2025/07/14/hello-world/#respond</comments>
		
		<dc:creator><![CDATA[mbuhamad]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 10:30:33 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://mbuhamad.com/?p=1</guid>

					<description><![CDATA[<p>Proof of Concept (POC) with Nozomi and Dragos Report Engr. Mashal Buhamad Strategic Note This report was prepared for a major regional operator responsible for critical infrastructure. It highlights the reality that cybersecurity transformation cannot occur in a vacuum—it must align with the unique constraints and architecture of the existing environment. The Proof of Concept [&#8230;]</p>
<p>The post <a href="https://mbuhamad.com/2025/07/14/hello-world/">Proof of Concept (POC)</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p><strong>Proof of Concept (POC) with Nozomi and Dragos Report</strong></p>



<p>Engr. Mashal Buhamad</p>



<p></p>



<p><strong>Strategic Note</strong></p>



<p>This report was prepared for a major regional operator responsible for critical infrastructure. It highlights the reality that cybersecurity transformation cannot occur in a vacuum—it must align with the unique constraints and architecture of the existing environment. The Proof of Concept (POC) with Nozomi Networks and Dragos made this evident, as key limitations in legacy systems and architectural inconsistencies directly impact visibility and threat detection capabilities.</p>



<p>The findings reinforce that <strong>a comprehensive cybersecurity strategy is no longer optional—it is essential</strong>. This strategy must orchestrate how the organization will overcome current equipment and protocol limitations, guide procurement decisions, standardize network architectures, and align stakeholders across departments and vendors. Only through a unified, forward-looking strategy can the organization achieve scalable, resilient, and effective OT cybersecurity. </p>



<p><strong>Introduction</strong></p>



<p>In the evolving landscape of industrial cybersecurity, we continually seek advanced solutions to safeguard organizations operating critical infrastructure, particularly in operational technology (OT) environments. One of the primary goals is to establish robust cybersecurity visibility. Two prominent players in this field are&nbsp;<strong>Nozomi Networks</strong>&nbsp;and&nbsp;<strong>Dragos</strong>. While other components such as SIEM are essential, these two form the cornerstone of any visibility-driven cybersecurity architecture. Conducting a Proof of Concept (POC) with these technologies is vital to evaluate their capabilities, strengths, and suitability for specific organizational needs. This report outlines the purpose and preliminary outcomes of the POC with Nozomi and Dragos.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Understanding Nozomi and Dragos</strong></h3>



<p><strong>Nozomi Networks</strong>: Known for its comprehensive OT and IoT security solutions, Nozomi Networks offers extensive visibility, threat detection, and actionable insights to protect critical infrastructure. Its platform enhances situational awareness and streamlines incident response. It is deployed globally across utilities, aviation, oil and gas, and other industrial sectors. The Nozomi POC was conducted using a demo unit provided by the vendor at a selected industrial site.</p>



<p><strong>Dragos</strong>: Specializing in OT cybersecurity, Dragos delivers a suite of capabilities including threat detection, incident response, and threat intelligence tailored for industrial control systems (ICS). Dragos is recognized for its deep expertise in identifying and mitigating advanced persistent threats (APTs) in OT environments. The Dragos POC was executed using packet captures collected from multiple sites, with support from a Dragos engineer. Notably, Dragos did not provide their appliance, which could suggest limitations in device readiness or maturity.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Purpose of a POC</strong></h3>



<p><strong>Technical Assessment</strong>:<br>The POC enabled a direct evaluation of Nozomi and Dragos in real-world settings. This included assessing their ability to detect/respond to threats, integrate with existing infrastructure, and provide meaningful visibility into OT networks. On-site deployment proved invaluable, providing firsthand insight into practical deployment challenges. Two significant issues were observed:</p>



<ul class="wp-block-list">
<li>Existing network nodes in the field <strong>lack port mirroring capabilities</strong>, making passive monitoring difficult without alternative solutions such as network taps.</li>



<li><strong>OT network environments lack standardization</strong>, with legacy and modern protocols (e.g., IEC 101 and IEC 104) coexisting within the same location, creating architectural inconsistencies.</li>
</ul>



<p><strong>Feature Comparison</strong>:<br>The side-by-side evaluation allowed comparison of capabilities including asset discovery, anomaly detection, threat intelligence integration, and incident response workflows. This helps define the most suitable use cases and placements for each solution.</p>



<p><strong>Accuracy</strong>:<br>Testing detection accuracy and the rate of false positives was critical. The POC offered clear insight into each solution’s ability to distinguish legitimate threats while minimizing noise. Additionally, asset detection capabilities were thoroughly evaluated, emphasizing the importance of post-deployment fine-tuning and enhancement.</p>



<p><strong>System Integration</strong>:<br>Based on the POC findings, a&nbsp;<strong>comprehensive technical proposal review</strong>&nbsp;is necessary to address newly identified challenges. Collaboration with&nbsp;<strong>independent international consultants</strong>&nbsp;is strongly advised to ensure effective project execution. Given the complexity of industrial cybersecurity environments, this initiative will require seamless coordination among multiple stakeholders.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>The POC with Nozomi Networks and Dragos provided actionable insights into their technical strengths and practical deployment within industrial OT settings. Both solutions excel in visibility, threat detection, and response—capabilities essential for protecting high-value critical infrastructure.</p>



<p>Key challenges identified during the POC—such as lack of port mirroring in field network devices and non-standardized communication architectures—must be addressed before full-scale deployment.</p>



<p>To move forward effectively, the technical proposal should be updated to reflect all POC findings. Engaging experienced external consultants will help align stakeholders, coordinate the project, and ensure its long-term success.</p>



<p>In summary, while Nozomi Networks and Dragos present solid options for industrial cybersecurity, overcoming existing environmental limitations and ensuring cohesive integration will be key to delivering a successful and secure implementation.</p>



<p></p>
<p>The post <a href="https://mbuhamad.com/2025/07/14/hello-world/">Proof of Concept (POC)</a> appeared first on <a href="https://mbuhamad.com">mbuhamad cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mbuhamad.com/2025/07/14/hello-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
