Together, solution providers and asset owners can forge tools to protect operations from cyberattacks.

Sharpening ‘Shields Up’: CISA Delivers Critical Infrastructure Cyber Performance Goals to Prioritize Decisions, Spending, and Action

| | Uncategorized
This month in honor of National Cybersecurity Awareness Month, President Biden announced new and lasting efforts to strengthen U.S. cybersecurity across the federal government and nation as a whole. Recognizing the need to build resilience within connected technologies and across technology-dependent critical infrastructure sectors, President Biden warned that “by destroying, ... Read More
binding operational directive 23-01

CISA Gets Serious About Visibility on Federal Networks – How U.S. Agencies Can Meet BOD 23-01

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Binding Operational Directive (BOD 23-01) that is designed to improve U.S. federal agencies’ ability to find vulnerabilities in their network for better prevention and response to cybersecurity incidents.  According to CISA, BOD 23-01 aims “to make measurable progress toward enhancing ... Read More
Oil and gas pipeline underwater

TSA Requirements: A Snapshot of Growing Attention to Pipeline Cybersecurity

| | Uncategorized
Pipeline operators are taking necessary steps to strengthen their digital infrastructure and build cyber resilience at a time of increased uncertainty. Depending on who you ask, nearly every digital component they rely on is potentially at risk in some way. While owners and operators realize the potential cascading effects of a ... Read More
Oil and gas pipeline underwater

TSA Requirements: A Snapshot of Growing Attention to Pipeline Cybersecurity

The post TSA Requirements: A Snapshot of Growing Attention to Pipeline Cybersecurity appeared first on Nozomi Networks ... Read More
Answering the Call for Heightened Vigilance in the Face of Unknown Threats

Answering the Call for Heightened Vigilance in the Face of Unknown Threats

With vendors leveraging increasingly advanced obfuscation and encryption techniques to protect the confidentiality of their code, finding vulnerabilities can be especially challenging. Another difficulty is the firmware itself becoming a challenge to reverse, if it was compiled for an obsolete architecture and commercial disassemblers can’t properly reconstruct it. The firmware ... Read More
Labs-Code-Blue-Security-Camera-Blog

Threat Intelligence: Analysis of the SBIDIOT IoT Malware

Billions of IoT devices are used in the industrial sector and threat actors are quickly evolving new malware focused on them. Don’t miss this analysis of the SBIDIOT IoT malware to learn how it communicates with targets and what types of commands it supports. Includes IOCs. The post Threat Intelligence: ... Read More
Cybersecurity for Building Automation Systems

Cybersecurity for Building Automation Systems

| | All, Blog
The building automation and facility sector is rapidly adopting IoT-based systems with the goal of significantly reducing operational costs. This digital transformation is connecting legacy systems to new devices and sensors, expanding the attack surface for cyber threats. Let’s look at both the promise of smart buildings and the realities ... Read More
WSJLookBackTargetsRevealed-BLOG

LookBack Malware Targets More Than a Dozen Utilities

The Wall Street Journal reported that more than a dozen U.S. utilities were targeted in the LookBack attack first revealed in August. Originally, security researchers divulged the details of a spearphishing campaign targeting three different United States utility companies. Now The Wall Street Journal has disclosed that FBI investigations have ... Read More