Category: IoT, IIoT, ICS-SCADA

December 19th, 2024 by Jj0hnnyj

I spoke on a Docent Institute webinar last night co-hosted by Iowa Illinois IEEE Section – R4 and IEEE Computer Society (Iowa-Illinois Chapter). The title of the talk is, “Navigating Cybersecurity and Systemic Risk in a Rapidly Advancing Technological Landscape”where I discussed #cybersecurity and #systemic_risk. Thanks to Binto George & Michael Umakor, who were co-hosts. Check out the video! You may find the video and slides here:

Posted in AI & Machine Learning, Autonomous Vehicles, Blockchain, Cloud, Critical Infrastructure, Cryptography, Cyberinsurance, Cybersecurity & Infosec, Emerging Technology, Ethics, Future Views, IoT, IIoT, ICS-SCADA, Law and Regulations, Presentations & Webinars, Privacy, Quantum Computing, Resiliency, Systemic Risk

March 17th, 2020 by John

Armis has published a list of MITRE ATT&CK techniques to aid security practitioners in assessing the strength of their cyber defenses and improve their ability to protect industrial control systems (ICS). #ICS #industrialcybersecurity #OT 

Here are links to the 4 parts in the series. Read More

Posted in Exploits & Attacks, IoT, IIoT, ICS-SCADA

October 7th, 2019 by John

As power grid evolves, so must cybersecurity.

//cdn.iframe.ly/embed.js

Posted in Critical Infrastructure, Cybersecurity & Infosec, Exploits & Attacks, Governance, IoT, IIoT, ICS-SCADA

October 5th, 2019 by John

[via Synack]

On January 1, 2020, California’s new Internet of Things (IoT) Security Law goes into effect. The law is the first IoT-specific security law in the United States and, simply put, requires all IoT devices sold in California to be equipped with reasonable security measures. The law requires that the connected device be equipped with “reasonable security features” appropriate to the nature and function of the device and the information it may collect or transmit, and designed to protect the device and any information within from unauthorized access, destruction, use, modification or disclosure. IoT equipment suppliers are being asked to implement “security by design”. The FCC states the definition as “A development practice that reduces cyber risk by using a disciplined process of continuous testing, authentication safeguards and adherence to best development practices.” Many are speculating if other states will adopt similar laws, but in the meantime, the California market is too big for suppliers to walk away from and many are trying to understand how these laws will impact their products.

Posted in IoT, IIoT, ICS-SCADA, Law and Regulations

October 2nd, 2019 by John

The Cybersecurity and Infrastructure Security Agency within the US Department of Homeland Security also released an advisory in July about the cybersecurity vulnerabilities, known as URGENT/11. “Some medical device manufacturers are already actively assessing which devices that use these operating systems are affected by URGENT/11 and identifying risk and remediation actions. Several manufacturers have also notified their customers consumers with devices determined to be affected so far, which include an imaging system, an infusion pump, and an anesthesia machine,” FDA says. [via CI Security]

https://www.raps.org/news-and-articles/news-articles/2019/10/fda-warns-of-widespread-device-cyber-vulnerabiliti

Posted in IoT, IIoT, ICS-SCADA, Vulnerabilities

September 30th, 2019 by John

Researchers at the Georgia Institute of Technology recently shed light on a less-discussed aspect of the threats of connecting the digital and physical worlds. In a study published in the journal Physical Review E, the researchers showed how hacked cars can cause mass mayhem by freezing traffic and gridlocking large cities. […] Yunker and his colleagues found that randomly hacking and stalling as much as 10 percent of cars during rush hour could bring traffic in a city such as Manhattan to a stand-still and disrupt critical services. This means that only a fraction of cars needs to be connected to the internet to make this threat a reality. [via CI Security 9/30/19]

Posted in IoT, IIoT, ICS-SCADA, Smart Cities

July 19th, 2019 by John

[via CI Security] Researchers say these new variants have the potential to impact cloud servers and heavily compromise information and insurance services and more. https://www.scmagazine.com/home/security-news/cybercrime/the-infamous-mirai-malware-has-grown-into-more-than-60-known-variants-and-has-since-set-its-sights-on-enterprise-devices/

As a result, connected devices at the enterprise level including medical devices, utility company meters, robots tracking warehouse inventory, and other devices are at risk. Devices connected to the cloud could allow Mirai adversaries to gain access to cloud servers, infect a server with additional malware dropped by Mirai, or expose all IoT devices connected to the server to further compromise.

Posted in IoT, IIoT, ICS-SCADA, Malware, PUPs and Botnets

May 3rd, 2019 by John

Posted in IoT, IIoT, ICS-SCADA