You are here

Cybersecurity

CISA Awards Grant for State, Local, Tribal, and Territorial Government IT Guidance and Best Practices Pilot Program

The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio a $1.2 million grant to conduct a pilot program to help state, local, tribal and territorial governments identify high value assets (HVA) to prioritize resources and planning. The pilot will aid these governments in establishing an HVA program that aligns with the federal government’s while maintaining the flexibility needed to incorporate their individual needs.

Joint NSA and CISA Guidance on Strengthening Cyber Defense Through Protective DNS

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a Joint Cybersecurity Information (CSI) sheet with guidance on selecting a protective Domain Name System (PDNS) service as a key defense against malicious cyber activity. Protective DNS can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking known-malicious domains.

Latest VPN Breaches Reinforce Importance of Trusting Your Provider

Detailed credentials for more than 21 million VPN users were swiped and advertised for sale online last week, offered by a cyber thief who allegedly stole user data collected by the VPN providers themselves. The data includes email addresses, randomly generated password strings, payment information, and device IDs belonging to users of three VPNs that offer their services for free – SuperVPN, GeckoVPN, and ChatVPN. While shocking, the unfortunate truth about the recent VPN data leak is that this type of data mishap is nothing new.

Pen Tester Shows Weaknesses at Nuclear Plant

In a recent interview published by Trustwave, a pen tester proved that even a well-protected nuclear power plant could use a cybersecurity tune up. Consultant Charles Hamilton reported that he had encountered a low-security Wifi hot-spot at his client’s facility set up by contractors.  From there, he was able to gain access to the network and some monitoring tools. Within two hours, he and domain-level access.

NSA Guidance on Zero Trust Security Model

The National Security Agency (NSA) has released Cybersecurity Information Sheet: Embracing a Zero Trust Security Model, which provides information about, and recommendations for, implementing Zero Trust within networks. The Zero Trust security model is a coordinated system management strategy that assumes breaches are inevitable or have already occurred. The Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators and organizations review NSA’s guidance to help secure sensitive data, systems, and services.

Greater Preparedness and Security in Light of Oldsmar, Regardless of Intent or Motivation

Risk management firm, The Gate 15 Company reviews the February 5, 2021 blended threat (cyber-physical) incident at the Oldsmar, Florida Water Treatment Plant in a recent blog post titled, “Blended Threats: Did Florida’s Cyber Attack Whet Your Appetite for Better Preparedness and Security?” The post highlights the blended threat concerns and reviews some best practices and mitigation actions drawn from WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities for greater preparedness.

Dragos 2020 ICS Cybersecurity Year in Review

In case you haven’t seen it yet, Dragos published its 2020 ICS Cybersecurity Year in Review yesterday. This years' report has some cool interactive elements displayed as an executive summary. Based on extensive experience, assessments, and incident response insights, Dragos shares its observations, lessons learned, and recommendations in this annual data-driven analysis of Industrial Control System (ICS)/Operational Technology (OT) focused cyber threats and vulnerabilities.

In addition to several key findings and recommendations for ICS defenders, read the report for more on:

CISA Alert: Exploitation of Accellion File Transfer Appliance

The Cybersecurity and Infrastructure Security Agency (CISA) has published an alert about cyber actors exploiting vulnerabilities in Accellion File Transfer Appliance, noting this activity has impacted organizations globally. According to the alert, the actors have attacked government entities at all levels (federal, state, local, and more) as well as private industry organizations, including those in the telecommunications and energy sectors. The alert contains technical details of the activity and a list of recommendations for organizations that use Accellion FTA.

OT/ICS Security – Going From A(ir Gap) to Z(ero Trust)

Zero trust has become a bit of a buzzword lately, especially since the disclosure of the SolarWinds incident. In addition, it’s possible that the concept of zero trust is thought of as applicable only to IT systems and may have industrial systems operators dismissing it. But as the air-gap continues to erode in favor or greater (remote) access to control systems, zero trust becomes essential.

Pages

Subscribe to Cybersecurity