Minimum Components of an SBOM Published by NTIA
· ICS Security

Minimum Components of an SBOM Published by NTIA

The NTIA (National Telecommunications and Information Administration) recently published the minimum elements for a Software Bill of Materials (more commonly known as SBOM). The document can be viewed HERE. What is an SBOM? – Definition of an SBOM An SBOM (Software Bill of Materials) is a formal record containing the details and supply chain relationships of […]

Read more →
Using Security Monitoring to Address Cybersecurity Threats
· ICS Security

Using Security Monitoring to Address Cybersecurity Threats

Joe Saunders, CEO of RunSafe Security, recently hosted a panel discussion on Monitoring Open Source Software in SAAS Infrastructure. His panel included business leaders in the software, technology, and security sectors: Jonathan B Fishbeck, Founder and CEO of EstateSpace, LLC, a Managed Security Services Provider (MSSP) that helps people reduce risk, retain property assets, and protect […]

Read more →
Cybersecurity for Cloud Migration
· ICS Security

Cybersecurity for Cloud Migration

In an interview with Merritt Baer (AWS Office of the CISO), Aaron Ansari VP, Cloud Security at Trend Micro discusses how fundamental information security is to business functions in today’s world. Cybersecurity is Job Zero It’s everyone’s job to ensure they are working to help secure the organization – from the frontline workers to the […]

Read more →
MQTT Principals to Mitigate IoT Cyberattack
· Cybersecurity

MQTT Principals to Mitigate IoT Cyberattack

In September 2016, the Mirai malware cyberattack shook the IoT world with a DDoS attack model that infected over 600,000 IoT devices. Such attacks on network-attached devices and IoT devices continue to increase exponentially. With the IDC predicting that there will be 41.6 billion connected IoT devices, generating 79.4 zettabytes (ZB) of data by 2025, the […]

Read more →
How to Get Started with Vulnerability Management in OT Cyber Security
· Cybersecurity

How to Get Started with Vulnerability Management in OT Cyber Security

Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference. What is OT/ICS vulnerability management? Vulnerability management in OT/ICS security is the process of identifying, evaluating, treating and monitoring/reporting on software insecurities and misconfigurations of endpoints. […]

Read more →
Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack
· ICS Security

Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack

Recently, the Russia-based hacking group REvil, attacked the Florida-based software company Kaseya Ltd. If you’re not familiar with Kaseya, they provide network and security management services for small to medium-sized businesses (SMBs), not unlike what SolarWinds offers for large businesses. So this is yet another attack taking advantage of poor software security at companies that […]

Read more →
[New report] The State of OT Security and the Cyber Supply Chain
· Cybersecurity

[New report] The State of OT Security and the Cyber Supply Chain

In March 2021, the Enterprise Strategy Group completed a research survey of 150 senior information technology (IT), cybersecurity, and operational technology (OT) professionals directly knowledgeable about their organization’s OT security practices. Organizations represented were from verticals in the retail supply chain, from manufacturers, to transportation (and AR in transportation) and logistics companies, all the way […]

Read more →
Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices
· ICS Security

Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices

Ransomware is a serious cybersecurity challenge that is growing at uncontrollable rates. Every 11 seconds, a new organization falls victim to a ransomware attack. And by the end of this year, the cost of ransomware to businesses is expected to surpass $20 billion. In this article we present some cybersecurity tactics to prevent jackware attacks […]

Read more →
Cybersecurity Threats to ICS Endpoints
· ICS Security

Cybersecurity Threats to ICS Endpoints

As the interconnection between IT (information technology) and OT (operational technology) continues to grow, cybersecurity for Industrial Control Systems (ICS) is becoming more important. Trend Micro shares their findings on both old and new threats that hound industrial endpoints in their “2020 Report on Threats Affecting ICS Endpoints.” Cybersecurity and Malware To validate ICS security […]

Read more →
2021 State of Operational Technology and Cybersecurity Report
· Cybersecurity

2021 State of Operational Technology and Cybersecurity Report

The 2021 State of Operational Technology and Cybersecurity Report from Fortinet finds that operational technology (OT) leaders continue to face cybersecurity challenges, some of which were exacerbated by the shift to work from home due to the pandemic. The pandemic also accelerated IT-OT network convergence for most organizations, which correlates to other CEO reports that […]

Read more →
Three Ways to Help Improve the Nation’s Cybersecurity
· ICS Security

Three Ways to Help Improve the Nation’s Cybersecurity

By now, you’ve heard about Executive Order 14028 on “Improving the Nation’s Cybersecurity” which President Biden signed in May, 2021. It begins by stating, “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.  The Federal Government must improve […]

Read more →
Who is Impacted by the Executive Order on Cybersecurity?
· ICS Security

Who is Impacted by the Executive Order on Cybersecurity?

On Wednesday, May 12, President Biden signed the Executive Order on Improving the Nation’s Cybersecurity. Who will be affected by EO #14028?Executive Orders can have the effect of law, ordering federal entities to take specific actions. They can also require certain terms to be included in federal contracts. And this is where the rubber hits the […]

Read more →