In today’s interconnected world, the realms of Information Technology (IT) and Operational Technology (OT) play pivotal roles in shaping the landscape of modern businesses. While both are essential components, their security landscapes differ significantly. In this blog post, we’ll explore the nuances between IT and OT security, shedding light on
One of the aspects of a mature security posture is how prepared the organization is to detect and response to cyber threats: due to a combination of factors that make cyber attacks easier to carry on and therefore more common, build the system to detect promptly such attacks and respond
We have previously introduced dhis2-tools-dab to the world, but many of you are wondering: how to I upgrade from the current dhis2-tools-ng to the new management system? This article explains how you can seamlessly upgrade your dhis-tools setup to utilise the new features provided by the new suite of tools.
With the more demanding need of reliability of critical infrastructures, security is a even more important aspect to take into account.The DHIS2 community has benefited years with the support of the DHIS2 team thanks to their official guidelines, tutorials, academy and discussion groups.