You are here

Cybersecurity

Employee Impersonation - Usurping Trusted Relationships

Employees and contractors can become mere victims of a cyber attack. Often their actions are unintentional, but damaging nonetheless, when credentials are shared with others or stolen and used by attackers to illegally authenticate to valuable systems. Knowing how employees and contractors access your systems and the devices they use will help detect anomalous behavior attempting to impersonate these trusted relationships.

Protecting Industrial IoT Deployments from Enabling Blended Attacks

As industrial organizations embrace the Internet of Things (IoT), they must strike the proper balance between benefit and risk. SecurityWeek posts an article highlighting strategies to reduce the vulnerabilities inherent in Industrial IoT deployments from resulting in unintended consequences threatening safety and security. Having a robust asset management program is the first step and is foundational to protecting every network environment.

New NCCIC Tip: Securing Network Infrastructure Devices

The NCCIC recently published Security Tip 18-001, Securing Network Infrastructure Devices, noting that this equipment constitutes an ideal target for malicious cyber actors. Moreover, the NCCIC submits that many of these devices are easy targets for attackers because they are not maintained at the same security level as general-purpose desktops and servers. This Security Tip aims to address this issue by providing users and network administrators with steps they can take to better secure their infrastructure.

Delta Electronics Delta Industrial Automation COMMGR (ICSA-18-172-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on a stack-based buffer overflow vulnerability in Delta Electronics Delta Industrial Automation COMMGR. COMMGR Version 1.08 and prior are affected. Successful exploitation of this vulnerability may allow remote code execution, cause the application to crash, or cause a denial-of-service condition in the application server.

Vulnerability Management and Supply Chain Security - Only as Strong as the Weakest Link

Understanding the organizational environment and addressing blind spots is foundational in achieving cybersecurity resilience in any system, IT or OT. Many organizations struggle with vulnerability management, and even more so with vendor/supply chain risk management, often sacrificing vendor risk completely. Threat actors will look for the weakest attack surface of an organization to exploit, which often exists through the supply chain.

More Sectors Partnering with Australia’s New Cyber Threat Sharing Centers

More and more Australian businesses and organizations are entering into partnerships with the county’s newly formed joint cyber security centres (JCSCs). And as a result, the JCSCs now have relationships with an expanding number of critical infrastructure sectors, which includes the water and wastewater sector, the energy sector, and the commercial facilities sector, among many others. The JCSCs are designed to co-located government, business, and academic cybersecurity experts so that they can share data and advice on threats.

Pages

Subscribe to Cybersecurity