Guestpost
The latest guest post from the ICS Cyber Security blog on the SeConSys blog: Mennyire biztonságos az ivóvíz-rendszer kiberbiztonsági szempontból? – ICS Cyber Security blog Translated by DeepL
The latest guest post from the ICS Cyber Security blog on the SeConSys blog: Mennyire biztonságos az ivóvíz-rendszer kiberbiztonsági szempontból? – ICS Cyber Security blog Translated by DeepL
14 July The US National Institute of Standards and Technology (NIST) is taking a hard line with federal agencies: they are advised to assume that they are already hacked or will be hacked! NIST Recommends Agencies Assume They Have Already Been Hacked – Breaking Defense Security Measures for “EO-Critical Software” Use | NIST Recommended Minimum …
Whose job is it to protect ICSs against APT attackers?! In previous posts (here, here, here és here), we have discussed the executive order, of 12 May and the CSIS event on it. The guest was Anne Neuberger, Deputy National Security Advisor for Cyber and Emerging Technologies. The issue is topical given the dynamic increase in …
12. July The Kaseya attack also highlights the increased dangers of remote access: Beyond Kaseya: Everyday IT Tools Can Offer ‘God Mode’ for Hackers | WIRED 13. July And just one example: vulnerability in remote access to Schneider Electric PLCs: Schneider Electric security bug allows remote code execution | IT PRO Translated by DeepL
8 July Is the Purdue model dead? If so, why not? Securing Industrial Control Systems From Modern Cyber Threats | Toolbox It-security 8 July Comparison of the handling of SolarWinds and Kaseya attacks: Has Kaseya dealt with cyberattack better than SolarWinds? | CyberNews 12 July Another result of the collaboration between MITRE and Dragos will …
The latest guest post from the ICS Cyber Security blog on the SeConSys blog: The Kaseya incident and its wider context Translated by DeepL
Július 7. Az ICS-eket 2021-ben várhatóan érő fenyegetések: Attacks on Operational Technology From IBM X-Force and Dragos Data (securityintelligence.com) Július 8. Jó összefoglaló az alapokról. De persze elolvasás után érdemes letölteni a kézikönyvet is! 🙂 (38) Cybersecurity for Electricity Utilities: Where to begin? | LinkedIn
In previous posts (here, here and here), we discussed the Executive Order of 12 May and the CSIS event on it. The guest was Anne Neuberger, Deputy National Security Advisor for Cyber and New Technologies. Section 3 of the Executive Order, as well as Neuberger’s emphasis on Zero Trust Architecture (ZTA) as one of the …
Cyber-attacks: the US gets up and back in the ring 4. Read More »
6. June Recommendations to strengthen the reliability of the digital supply chain: 3 principles to reinforce digital trust in supply chains – Analyses – EBR (europeanbusinessreview.eu) Translated by DeepL
June TrendMicro report on threats to ICS endpoints in 2020: 2020 Report on Threats Affecting ICS Endpoints (trendmicro.com) 25 June Guidance on the application of IEC 62443: The Ultimate Guide to Protecting OT Systems with IEC 62443 – Verve Industrial 2 July A thought-provoking report on the cyber security and resilience of Switzerland’s electricity supply: …