You are here

Cybersecurity

Vulnerability Management and Supply Chain Security - Only as Strong as the Weakest Link

Understanding the organizational environment and addressing blind spots is foundational in achieving cybersecurity resilience in any system, IT or OT. Many organizations struggle with vulnerability management, and even more so with vendor/supply chain risk management, often sacrificing vendor risk completely. Threat actors will look for the weakest attack surface of an organization to exploit, which often exists through the supply chain.

More Sectors Partnering with Australia’s New Cyber Threat Sharing Centers

More and more Australian businesses and organizations are entering into partnerships with the county’s newly formed joint cyber security centres (JCSCs). And as a result, the JCSCs now have relationships with an expanding number of critical infrastructure sectors, which includes the water and wastewater sector, the energy sector, and the commercial facilities sector, among many others. The JCSCs are designed to co-located government, business, and academic cybersecurity experts so that they can share data and advice on threats.

EU Parliament Calls Kaspersky “Confirmed as Malicious,” Recommends Ban

On June 13, the European Union (EU) Parliament passed a resolution characterizing Kaspersky as “confirmed as malicious.” While the resolution is not a ban or legally binding, it does recommend banning the company from information technology used throughout the EU. The vote signals the newest wave of challenges to the company from nations. In September 2017, the U.S.

Schneider Electric U.motion Builder (ICSA-18-163-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on command injection, cross-site scripting, and improper input validation vulnerabilities in Schneider Electric U.motion Bulder. Versions prior to 1.3.4 are affected. Successful exploitation of these vulnerabilities could allow remote code execution. Schneider Electric has released firmware update Version 1.3.4, which includes fixes for these vulnerabilities.

Pages

Subscribe to Cybersecurity