Cybersecurity Risks for Open Source Code
· ICS Security

Cybersecurity Risks for Open Source Code

The adoption of open source code has increased exponentially over the past decade, with a large percentage of commercial software now containing it. Developers are constantly sharing common features and code functionality across the internet and globe. The speed and demand placed upon application teams is high – business used to run via application releases a handful […]

Read more →
Deciphering Executive Order 14028: Improving the Nation’s Cybersecurity
· Cybersecurity

Deciphering Executive Order 14028: Improving the Nation’s Cybersecurity

An Executive Order (EO) issued by a U.S. President is usually a pretty straightforward document. Most are just two or three pages long with a handful of directives. This is definitely not the case with President Biden’s latest EO, Executive Order on Improving the Nation’s Cybersecurity. This is a massive policy document weighing in at […]

Read more →
Cybersecurity Tips to Avoid Ransomware Attacks
· ICS Security

Cybersecurity Tips to Avoid Ransomware Attacks

This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious actors in your network. Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. The majority of […]

Read more →
Executive Order Issued to Improve the Nation’s Cybersecurity
· ICS Security

Executive Order Issued to Improve the Nation’s Cybersecurity

On Wednesday, May 12, President Biden signed the Executive Order on Improving the Nation’s Cybersecurity.  Given the EO is 18 pages long and includes 74 actionable directives (many with due dates), it could take months to fully decipher and comprehend.  Unfortunately, most companies don’t have months to understand how this EO will impact them. aDolus has provided […]

Read more →
Cybersecurity to Improve Profitability
· ICS Security

Cybersecurity to Improve Profitability

Cybersecurity has financial benefits, offers product differentiation, and smooths out the patching processes both for product manufacturers and their customers. The importance of cyber defense will go up over time. Cyber defense and security for embedded systems is justified using a total cost of ownership approach, as quantifying economic benefits will help justify faster adoption. […]

Read more →
Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software
· Cybersecurity

Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software

Current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. Recent research by RunSafe Security partners show that current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. When measured against NIST CVEs (Common Vulnerability Enumerations from the National Vulnerability Database), […]

Read more →
eBook: Manufacturing Cybersecurity Case Studies
· Cybersecurity

eBook: Manufacturing Cybersecurity Case Studies

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several issues within smart factory security, namely with difficult-to-eliminate vulnerabilities, the spread of malware, and flat network configurations. Furthermore, when […]

Read more →
White Paper: The State of Industrial Cybersecurity
· Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time. There were inconsistencies in technology and environment, and also in people and processes. This survey provides insight into the […]

Read more →
A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned
· ICS Security

A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned

A SolarWinds-style cyberattack happened back in in 2013-14 that affected big government agencies and thousands of companies. What should we have learned from the Dragonfly/HAVEX attack? Software Infiltration A cyberattack group called Dragonfly attacked power plants and industrial sites, employing a very similar tactic to SolarWinds. “The technique of injecting into a supply chain is […]

Read more →
Protecting IT and OT Resources Against Advanced Threats in Manufacturing
· Connected Industry

Protecting IT and OT Resources Against Advanced Threats in Manufacturing

Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical safety, and in some cases, national security. Companies strive to secure their systems while maintaining business imperatives like operational […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
2020 Annual Cybersecurity Report
· ICS Security

2020 Annual Cybersecurity Report

Looking back at a most unprecedented year, Trend Micro’s Annual cybersecurity Report surveys the most notable and crucial security concerns that emerged and persisted in 2020, and provides users and organizations with insights into how they can navigate a drastically changing threat landscape.  One of the areas of concern is supply chains. Cybersecurity Threats on Supply Chains […]

Read more →