You are here

Cybersecurity

Information and Communication Technology Supply Chain COVID-19 Lessons Learned

The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry partners recently published the Building A More Resilient ICT Supply Chain: Lessons Learned During The COVID-19 Pandemic report, which examines how the COVID-19 pandemic impacted the logistical supply chains of information and communication technology companies and provides recommendations to increase supply chain resilience.

WECON PLC Editor (ICSA-20-310-01) - Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on stack-based buffer overflow and heap-based buffer overflow vulnerabilities in WECON PLC Editor. Versions 1.3.8 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application. WECON is aware of these vulnerabilities and is currently developing a solution. CISA also recommends a seried of measures to mitigate these vulnerabilities.

What Every CISO Should Ask about OT/ICS Security

It is not uncommon for OT/ICS cybersecurity to fall under the authority of IT. This isn’t necessarily a bad thing, unless IT is taking responsibility/action and lacks OT-specific knowledge. While many concepts can be drawn from IT security to help secure OT, many of the processes do not translate well. The opposite also presents a challenge, as many OT operators and engineers may not have cybersecurity experience. This is why it is imperative for both OT and IT cybersecurity teams to work together; however, that isn’t always as easy as it sounds.

CISA Assistant Director Message for Infrastructure Security Month

Acting Assistant Director for Infrastructure Security Steven Harris at the Cybersecurity and Infrastructure Security Agency (CISA) has authored a message for critical infrastructure partners on the occasion of Infrastructure Security Month. During this month, Harris encourages partners to refresh their infrastructure security knowledge and spread effective messages in their communities and to their stakeholders.

Pages

Subscribe to Cybersecurity