Attacks from 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks
5G is projected to have an impact on the future, though its effects are already being felt today. A part of this conversation is the 4G/5G campus network, which is being rolled out in smart factories,…
[E-Book] The State of OT Cyber Security
Many predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions and attacks. However, relative to…
Minimum Components of an SBOM Published by NTIA
The NTIA (National Telecommunications and Information Administration) recently published the minimum elements for a Software Bill of Materials (more commonly known as SBOM). The document can be viewed HERE. What is an SBOM? – Definition of an…
Using Security Monitoring to Address Cybersecurity Threats
Joe Saunders, CEO of RunSafe Security, recently hosted a panel discussion on Monitoring Open Source Software in SAAS Infrastructure. His panel included business leaders in the software, technology, and security sectors: Jonathan B Fishbeck, Founder and CEO…
Cybersecurity for Cloud Migration
In an interview with Merritt Baer (AWS Office of the CISO), Aaron Ansari VP, Cloud Security at Trend Micro discusses how fundamental information security is to business functions in today’s world. Cybersecurity is Job Zero It’s…
MQTT Principals to Mitigate IoT Cyberattack
In September 2016, the Mirai malware cyberattack shook the IoT world with a DDoS attack model that infected over 600,000 IoT devices. Such attacks on network-attached devices and IoT devices continue to increase exponentially. With the IDC…
How to Get Started with Vulnerability Management in OT Cyber Security
Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference. What is OT/ICS vulnerability management? Vulnerability management…
Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack
Recently, the Russia-based hacking group REvil, attacked the Florida-based software company Kaseya Ltd. If you’re not familiar with Kaseya, they provide network and security management services for small to medium-sized businesses (SMBs), not unlike what SolarWinds…
How to combat the cybersecurity risk from a changing IIoT
The Industrial Internet of Things (“IIoT”) is evolving at a rapid pace, with experts predicting that 35 billion IoT devices1 will be installed around the world by the end of 2021, so the question is “How…
[New report] The State of OT Security and the Cyber Supply Chain
In March 2021, the Enterprise Strategy Group completed a research survey of 150 senior information technology (IT), cybersecurity, and operational technology (OT) professionals directly knowledgeable about their organization’s OT security practices. Organizations represented were from verticals…