Ship cyber security guidelines launched

As vessels at sea become better linked via broadband satellite and other connections, the risk of ship cyber security issues increases. To increase awareness of these risks, the global shipping community released guidelines for avoiding potential cyber vulnerabilities that could potentially drive major safety, environmental and commercial incidents. The guidelines were released by BIMCO, the largest international shipping association, and [...]

Cybersecurity threats in 2016

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Cyber security responsibilities: who owns it?

The Stop. Think. Connect. campaign is five years old this year, and while it has achieved several of the goals it began with, much of the public's increased awareness of cyber security has been based on the increasingly alarming data breaches of large corporations and the government. Statistics from the campaign say that "Nearly two-thirds of the [...]

“Flavor of the day” network security

Network security is tough. Too often a new attack vector appears on the scene and vendors scramble to put out a product to counter it. Companies scramble to implement it. And the bad guys scramble to find a new attack vector and it all starts over again. After a few cycles, this can lead to [...]

FBI publishes examples of IoT risks

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]

Greater cybersecurity for satellite & SCADA

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Putting air bags in a 1965 Mustang?

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]

Breach report blames the usual suspects

The annual Verizon data breach investigations report came out this week with findings that show that the biggest threats are not new or unknown, but the same vulnerabilities that have plagued IT for years. It's been said that the only difference between a problem and a solution is that people understand the solution. Maybe not [...]

Continuing concerns over industrial networks

It's not a new topic, but SCADA and other industrial control networks continue to be integrated into IP networks and utilize old computing platforms (Windows XP) for management of the programmable logic controllers (PLCs) that actually control industrial equipment. There are a number of well-known espionage examples of PLCs being exploited with malware, like the [...]